Modern computer architectures share physical resources between different programs in order to increase area-, energy-, and cost- efficiency. Unfortunately, sharing often gives rise to side channels that can be exploited for extracting or transmitting sensitive information. We currently lack techniques for systematic reasoning about this interplay between security and efficiency. In particular, there is no established way for quantifying security properties of shared caches. In this paper, we propose a novel model that enables us to characterize important security properties of caches. Our model encompasses two aspects: (1) The amount of information that can be absorbed by a cache, and (2) the amount of information that can effectively be ex...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Abstract — As CMPs are emerging as the dominant architecture for a wide range of platforms (from emb...
Modern computer architectures share physical resources between different programs in order to increa...
Performance has been and will continue to be a key criterion in the development of computer systems ...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Cache attacks exploit the hardware vulnerabilities inherent to modern processors and pose a new thre...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
International audienceModern processors use cache memory: a memory access that “hits” the cache retu...
Computing system security is important for everyday functioning of society, among other things. We s...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Abstract — As CMPs are emerging as the dominant architecture for a wide range of platforms (from emb...
Modern computer architectures share physical resources between different programs in order to increa...
Performance has been and will continue to be a key criterion in the development of computer systems ...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Cache attacks exploit the hardware vulnerabilities inherent to modern processors and pose a new thre...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
International audienceModern processors use cache memory: a memory access that “hits” the cache retu...
Computing system security is important for everyday functioning of society, among other things. We s...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Abstract — As CMPs are emerging as the dominant architecture for a wide range of platforms (from emb...