With the increasing complexity of cryptographic algorithms, attackers are looking for side channels to compromise private data. While attackers are tracking side channels, they leave traces behind them unintentionally. In this work, we concentrated on Flush+Reload type of attacks which is aimed to retrieve private data by using intentional contentions on shared resource. Our shared resource is 11 Data Cache of CPU. The trace of attackers on shared resource is a great asset for extraction of utilization pattern which is strong indicator for presence of attacker in the system. For this reason we collected data and extract utilization characteristics of the resource by using hard ware performance counters. In this work, by taking the advantag...
Research on cache attacks has shown that CPU caches leak signi_cant information. Proposed detection ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
Research on cache attacks has shown that CPU caches leak signi_cant information. Proposed detection ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
Research on cache attacks has shown that CPU caches leak signi_cant information. Proposed detection ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...