Abstract This paper proposes a new memory controller design that enables secure sharing of main memory among mutually mistrusting parties by eliminating memory timing channels. This study demonstrates that shared memory controllers are vulnerable to both side channel and covert channel attacks that exploit memory interference as timing channels. To address this vulnerability, we identify the sources of interference in a conventional memory controller design, and propose a protection scheme to eliminate the interference across security domains through two main changes: (i) a per security domain based queueing structure, and (ii) static allocation of time slots in the scheduling algorithm. Multi-programmed workloads comprised of SPEC2006 benc...
Public infrastructure-as-a-service clouds, such as Ama-zon EC2 and Microsoft Azure allow arbitrary c...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Main memories are a key shared resource within modern computing systems. This thesis shows that memo...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
International audienceTiming side-channels are an identified threat for security critical software. ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
Public infrastructure-as-a-service clouds, such as Ama-zon EC2 and Microsoft Azure allow arbitrary c...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Main memories are a key shared resource within modern computing systems. This thesis shows that memo...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
International audienceTiming side-channels are an identified threat for security critical software. ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
Public infrastructure-as-a-service clouds, such as Ama-zon EC2 and Microsoft Azure allow arbitrary c...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...