Increased peripheral performance is causing strain on the memory subsystem of modern processors. For example, available DRAM throughput can no longer sustain the traffic of a modern network card. Scrambling to deliver the promised performance, instead of transferring peripheral data to and from DRAM, modern Intel processors perform I/O operations directly on the Last Level Cache (LLC). While Direct Cache Access (DCA) instead of Direct Memory Access (DMA) is a sensible performance optimization, it is unfortunately implemented without care for security, as the LLC is now shared between the CPU and all the attached devices, including the network card.In this paper, we reverse engineer the behavior of DCA, widely referred to as Data-Direct I/O ...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Network security is an ongoing major problem in today\u27s Internet world. Even though there have be...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Over the last years, timing channels that exploit resources shared at the microarchitectural level h...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). G...
Memory access is the major bottleneck in realizing multi-hundred-gigabit networks with commodity har...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Abstract. Cache attacks, which exploit differences in timing to perform covert or side channels, are...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Network security is an ongoing major problem in today\u27s Internet world. Even though there have be...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Over the last years, timing channels that exploit resources shared at the microarchitectural level h...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). G...
Memory access is the major bottleneck in realizing multi-hundred-gigabit networks with commodity har...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Abstract. Cache attacks, which exploit differences in timing to perform covert or side channels, are...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Network security is an ongoing major problem in today\u27s Internet world. Even though there have be...