Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral e ects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc counter- measures can be applied only when such a risky situation arises. In our case, the victim process is the Advanced Encryption Standard (AES) encryption algorithm and the attack is performed by means of random e...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementati...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...