Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchitectural attacks, e.g. Meltdown and Spectre. Microarchitectural attacks exploit the effects of microarchitectural components or optimizations in order to leak data to an attacker. These attacks have caused processor manufacturers to introduce performance impacting mitigations in both software and silicon. To investigate the performance impact of the various mitigations, a test suite of forty-seven different tests was created. This suite was run on ...
Intel Software Guard Extensions (SGX) is a novel hardware-assisted security technology introduced by...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In the aftermath of Spectre and Meltdown researchers have proposed a variety of attack detection sol...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
We present Value Prediction for Security (VPsec), a novel hardware-only framework to counter fault a...
This thesis makes two contributions: (1) a measurement study of the performance evolution of mitigat...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
With a booming number of applications and end-users in the past decade, software security has been e...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Intel Software Guard Extensions (SGX) is a novel hardware-assisted security technology introduced by...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In the aftermath of Spectre and Meltdown researchers have proposed a variety of attack detection sol...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
We present Value Prediction for Security (VPsec), a novel hardware-only framework to counter fault a...
This thesis makes two contributions: (1) a measurement study of the performance evolution of mitigat...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
With a booming number of applications and end-users in the past decade, software security has been e...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Intel Software Guard Extensions (SGX) is a novel hardware-assisted security technology introduced by...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In the aftermath of Spectre and Meltdown researchers have proposed a variety of attack detection sol...