International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the emerging computing platforms. To mitigate these attacks, numerous countermeasures have been proposed. However, these countermeasures require either radical hardware modification or they are incompatible with the performance features like super-page and data de-duplication. This paper presents a countermeasure, called Flush+Prefetch, which obfuscates the memory access behavior of a secure application using independent threads that randomly access the memory belonging to secure application. Unlike existing state-of-the-art countermeasures, Flush+Prefetch works with commodity hardware and it is compatible with existing performance features. As a...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the ...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Research on cache attacks has shown that CPU caches leak signi_cant information. Proposed detection ...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the ...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Research on cache attacks has shown that CPU caches leak signi_cant information. Proposed detection ...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the ...