International audienceBesides cryptographic secrets, software-based side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. These attacks have also been demonstrated in JavaScript embedded in websites by a remote attacker. We extend the state-of-the-art with a new interrupt-based attack and the first Prime+ Probe attack on kernel interrupt handlers. Previously proposed countermeasures fail to prevent software-based keystroke timing attacks as they do not protect keystroke processing through the entire software stack. We close this gap with KeyDrown, a new defense mechanism against software-base...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The COVID-19 pandemic has significantly impacted people by driving people to work from home using co...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
International audienceBesides cryptographic secrets, software-based side-channel attacks also leak s...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
We show how malicious web content can extract cryptographic secret keys from the user\u27s computer....
Many secure systems, such as SSH, encrypt communications but fail to obscure inter-keystroke timing ...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
When software is designed, even with security in mind, assumptions are made about the details of har...
This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack me...
With recent developments in deep learning, the ubiquity of micro-phones and the rise in online servi...
We present a new side-channel attack against soft keyboards that support gesture typing on Android s...
Shoulder surfing attacks are an unfortunate consequence of entering passwords or PINs into computers...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
In this dissertation we study some of the problems arising on computer systems that leak information...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The COVID-19 pandemic has significantly impacted people by driving people to work from home using co...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
International audienceBesides cryptographic secrets, software-based side-channel attacks also leak s...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
We show how malicious web content can extract cryptographic secret keys from the user\u27s computer....
Many secure systems, such as SSH, encrypt communications but fail to obscure inter-keystroke timing ...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
When software is designed, even with security in mind, assumptions are made about the details of har...
This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack me...
With recent developments in deep learning, the ubiquity of micro-phones and the rise in online servi...
We present a new side-channel attack against soft keyboards that support gesture typing on Android s...
Shoulder surfing attacks are an unfortunate consequence of entering passwords or PINs into computers...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
In this dissertation we study some of the problems arising on computer systems that leak information...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The COVID-19 pandemic has significantly impacted people by driving people to work from home using co...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...