SoCs are required to maintain information private when requested by the Operating System (OS) or the application. From a high level point of view, there are time domains, typically processes or threads, and there should be no time information leak between them. At the same time, cores inside SoCs are supposed to be fast levering many predictors and resource sharing for efficiency. Using predictors like caches and branch predictors can have side effects that leak information across time domains. Specifically, the challenge is that the code executed by one time domain affects the performance of another. This time impact information leak can be exploited as a side channel attack. The goal of this work is to classify the different side chann...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Modern processors dynamically control their operating frequency to optimize resource utilization, ma...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Modern processors dynamically control their operating frequency to optimize resource utilization, ma...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...