International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent attacks taking advantage of vulnerabilities/features in their microarchitectures to retrieve secret information. Indeed, the increase in complexity of modern CPU and SoC is mainly driven by the seek of performance rather than security. Even if efforts like isolation techniques have been taken to thwart cyberattacks, most microarchitectural features can open the door to security holes. One typical example is the exploitation of cache memory which keeps track of the program execution and paves the way to side-channel (SCA) analysis and transient execution attacks like Meltdown and Spectre, which take advantage of speculative execution. This paper ...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
The discovery of hardware vulnerabilities has increasingly become more frequent in recent years. In ...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
International audienceAs processors become more and more complex due to performance optimizations an...
International audienceRecent works have highlighted the vulnerability of System-on-a-Chip (SoC) plat...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Microarchitectural attacks exploit target hardware properties to break software isolation techniques...
The isolation among physically co-located virtual machines is an important prerequisite for ensuring...
Over the past decades, the major objectives of computer design have been to improve performance and ...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
The discovery of hardware vulnerabilities has increasingly become more frequent in recent years. In ...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
International audienceAs processors become more and more complex due to performance optimizations an...
International audienceRecent works have highlighted the vulnerability of System-on-a-Chip (SoC) plat...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Microarchitectural attacks exploit target hardware properties to break software isolation techniques...
The isolation among physically co-located virtual machines is an important prerequisite for ensuring...
Over the past decades, the major objectives of computer design have been to improve performance and ...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...