International audienceResearch on cache-based side-channel attacks shows the security impact of these attacks on cloud computing. Therefore , the detection of cache-based side-channel attacks has received more attention in IaaS cloud infrastructures because of improvements in the attack techniques. However, such detection requires high resolution information, and it is also a challenging task because of the fine-granularity of the attacks. In this paper, we present an approach to detect cross-VM cache-based side-channel attacks through using hardware fine-grained information provided by Intel Cache Monitoring Technology (CMT) and Hardware Performance Counters (HPCs) following the Gaussian anomaly detection method. The approach shows a high ...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the ...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thir...
Privacy protection is an essential part of information security. The use of shared resources demands...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cloud computing is an important technology that significantly reduces costs and increases operations...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the ...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thir...
Privacy protection is an essential part of information security. The use of shared resources demands...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cloud computing is an important technology that significantly reduces costs and increases operations...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...