Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. A system usinga microkernel can be constructed using the operating-system framework Genode, which provides security features and a strict process hierarchy. However, these systems may still be vulnerable to microarchitectural attacks, which can bypassan operating system's security features, exploiting vulnerable hardware. This thesis aims to investigate whether microkernels are vulnerable to the microarchitectural attacks Meltdown and Spectre...
Microkernel-based operating systems provide high level of protection due to the strong isolation of ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Microkernel-based operating systems provide high level of protection due to the strong isolation of ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Microkernel-based operating systems provide high level of protection due to the strong isolation of ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...