Over the last decades the digitalization has become an integral part of daily life. Computer systems complexity has also grown at a rapid pace. New business models have emerged to optimize utilization and maintenance cost of these complex systems, but neglecting the introduction of new security threats. Cloud computing, for instance, has been established as an important part of the modern IT infrastructure ignoring the potential security risks entailed in its pervasive usage. A popular threat in the Cloud and other complex systems that are reliant on the usage of shared resources stems from the exploitation of side channels. In the context of co-location of mutually untrusted users on the same hardware, the confidentiality of user data...
Cloud computing is gaining traction due to the business agility, resource scalability and operationa...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Over the last decades the digitalization has become an integral part of daily life. Computer system...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
Cloud computing is based on the sharing of physical resources among several virtual machines through...
Cloud computing is an important technology that significantly reduces costs and increases operations...
Computing system security is important for everyday functioning of society, among other things. We s...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Performance has been and will continue to be a key criterion in the development of computer systems ...
In this dissertation we study some of the problems arising on computer systems that leak information...
Cloud computing is gaining traction due to the business agility, resource scalability and operationa...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Over the last decades the digitalization has become an integral part of daily life. Computer system...
AbstractCloud computing means different things to different people. It is another way of outsourcing...
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
Cloud computing is based on the sharing of physical resources among several virtual machines through...
Cloud computing is an important technology that significantly reduces costs and increases operations...
Computing system security is important for everyday functioning of society, among other things. We s...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Performance has been and will continue to be a key criterion in the development of computer systems ...
In this dissertation we study some of the problems arising on computer systems that leak information...
Cloud computing is gaining traction due to the business agility, resource scalability and operationa...
Abstract—Privacy and information security in general are major concerns that impede enterprise adapt...
International audienceTiming-based side-channels play an important role in exposing the state of a p...