Side channels are vulnerabilities that can be attacked by observing the behaviour of applications and by inferring sensitive information just from this behaviour. Because side channel vulnerabilities appear in such a large spectrum of contexts, there does not seem to be a generic way to prevent all side channel attacks once and for all. A practical approach is to research for new side channels and to specifically tailor mitigations for new side channel attacks. In this thesis, we extend the field of side channel attacks by introducing new ways to attack and to mitigate side channels in web applications. We start by proposing a new classification scheme for information leaks based on the information decoding effort an attacker has to spend. ...
Web-based timing attacks have been known for over a decade, and it has been shown that, under optima...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Recent research has shown that many popular web applications are vulnerable to side-channel attacks ...
In this dissertation we study some of the problems arising on computer systems that leak information...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
PhDIt is not a secret that communications between client sides and server sides in web application...
Abstract—Information leakage via side channels has become a primary security threat to encrypted web...
When software is designed, even with security in mind, assumptions are made about the details of har...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
International audienceMicroarchitectural side-channel attacks can derive secrets from the execution ...
Web traffic is exposed to potential eavesdroppers, and despite the use of encryption mechanisms, it ...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
International audience<p>Web applications are subject to several types of attacks. In particular, si...
Web-based timing attacks have been known for over a decade, and it has been shown that, under optima...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Recent research has shown that many popular web applications are vulnerable to side-channel attacks ...
In this dissertation we study some of the problems arising on computer systems that leak information...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
PhDIt is not a secret that communications between client sides and server sides in web application...
Abstract—Information leakage via side channels has become a primary security threat to encrypted web...
When software is designed, even with security in mind, assumptions are made about the details of har...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
International audienceMicroarchitectural side-channel attacks can derive secrets from the execution ...
Web traffic is exposed to potential eavesdroppers, and despite the use of encryption mechanisms, it ...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
International audience<p>Web applications are subject to several types of attacks. In particular, si...
Web-based timing attacks have been known for over a decade, and it has been shown that, under optima...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...