In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are, in particular, concerned with attacks that are carried out by creating intentional contentions in shared resources with cryptographic applications using a spy process. At a very high level, the approach quantifies contentions in shared resources, associates these contentions with processes, such as with a victim process, and issues a warning at runtime whenever the contentions reach a suspicious level. We then adapt this approach to detect the presence of four different types of cache-based side-channel attacks, namely prime-and-probe attacks on advanced encryp...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceWe design and implement the espionage infrastructure to launch a cache-based s...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side channel attacks provide an effective way to extract secret information from the execution of cr...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceWe design and implement the espionage infrastructure to launch a cache-based s...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side channel attacks provide an effective way to extract secret information from the execution of cr...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...