In the last years, a series of side channels have been discovered on CPUs. These side channels have been used in powerful attacks, e.g., on cryptographic implementations, or as building blocks in transient-execution attacks such as Spectre or Meltdown. However, in many cases, discovering side channels is still a tedious manual process. In this paper, we present Osiris, a fuzzing-based framework to automatically discover microarchitectural side channels. Based on a machine-readable specification of a CPU's ISA, Osiris generates instruction-sequence triples and automatically tests whether they form a timing-based side channel. Furthermore, Osiris evaluates their usability as a side channel in transient-execution attacks, i.e., as the micro...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isol...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isol...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...