Although modern computer systems process increasing amounts of sensitive, private, and valuable information, most of today’s operating systems (OSs) fail to protect confidential data against unauthorized disclosure over covert channels. Securing the large code bases of these OSs and checking the secured code for the absence of covert channels would come at enormous costs. Microkernels significantly reduce the necessarily trusted code. However, cost-efficient, provable confidential-data protection in microkernel-based systems is still challenging. This thesis makes two central contributions to the provable protection of confidential data against disclosure over covert channels: • A budget-enforcing, fixed-priority scheduler that provab...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis tech...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Although modern computer systems process increasing amounts of sensitive, private, and valuable info...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
Microarchitectural timing channels enable unwanted information flow across security boundaries, viol...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Content file updated by author on 15 January 2015.Timing channels pose a real security risk, but met...
In this dissertation we study some of the problems arising on computer systems that leak information...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
none5siMicroarchitectural timing channels use variations in the timing of events, resulting from com...
Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis tech...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis tech...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Although modern computer systems process increasing amounts of sensitive, private, and valuable info...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
Microarchitectural timing channels enable unwanted information flow across security boundaries, viol...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Content file updated by author on 15 January 2015.Timing channels pose a real security risk, but met...
In this dissertation we study some of the problems arising on computer systems that leak information...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
none5siMicroarchitectural timing channels use variations in the timing of events, resulting from com...
Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis tech...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Access-driven cache-based sidechannel attacks, a sub-category of SCAs, are strong cryptanalysis tech...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...