Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral e ects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc counter- measures can be applied only when such a risky situation arises. In our case, the victim process is the Advanced Encryption Standard (AES) encryption algorithm and the attack is performed by means of random e...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Abstract. This paper demonstrates complete AES key recovery from known-plaintext timings of a networ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Abstract. This paper demonstrates complete AES key recovery from known-plaintext timings of a networ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...