Finding minimal eviction sets, sets of memory addresses of minimum size that can evict content from the cache, is essential in many cache side-channel attacks. There is a lack of knowledge about numerous elements of the microarchitecture involved in those side-channel attacks, such as replacement policies, slicing and translation of virtual to physical addresses. In order to better understand the security performance of caches and to bridge the gap between the results of tests over real hardware, and the theoretical behaviour of caches, we create a model of the microarchitectural aspects of computers relevant to finding minimal eviction sets. The model allows simulating tests on different caches, thanks to the parametrization of th...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Modern CPUs use a variety of undocumented microarchitectural hash functions to efficiently distribut...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
Finding minimal eviction sets, sets of memory addresses of minimum size that can evict content from...
Eviction sets are groups of memory addresses that map to the same cache set. They can be used to per...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In this dissertation we study some of the problems arising on computer systems that leak information...
Process isolation is the most important security constraint enforced by operating systems in multita...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Our artifact is comprised of a cache model, a cache-occupancy attack implementation, and a Maximal L...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Modern CPUs use a variety of undocumented microarchitectural hash functions to efficiently distribut...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
Finding minimal eviction sets, sets of memory addresses of minimum size that can evict content from...
Eviction sets are groups of memory addresses that map to the same cache set. They can be used to per...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In this dissertation we study some of the problems arising on computer systems that leak information...
Process isolation is the most important security constraint enforced by operating systems in multita...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Our artifact is comprised of a cache model, a cache-occupancy attack implementation, and a Maximal L...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Modern CPUs use a variety of undocumented microarchitectural hash functions to efficiently distribut...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...