Computer systems are often analyzed as purely virtual artifacts, a collection of software operating on a Platonic ideal of a computer. When software is executed, it runs on actual hardware: an increasingly complex web of analog physical components and processes, cleverly strung together to present an illusion of pure computation. When an abstract software system is combined with individual hardware instances to form functioning systems, the overall behavior varies subtly with the hardware. These minor variations can change the security and privacy guarantees of the entire system, in both beneficial and harmful ways. We examine several such security effects in this dissertation. First, we look at the fingerprinting capability of JavaScript a...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Over the past decades, the major objectives of computer design have been to improve performance and ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
The discrepancy between the abstract model used to reason about the security of computer systems and...
When software is designed, even with security in mind, assumptions are made about the details of har...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Abstract—This paper investigates a novel attack vector against cryptography realized on FPGAs, which...
Hardware Trojans are an important threat to the security of integrated circuits. They assume a malic...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
In the last few years, security has become one of the key challenges in computing systems. Failures ...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
In the last years there has been a considerable growth on the number of users id on-line banking (Sz...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
Over the past decades, the major objectives of computer design have been to improve performance and ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
The discrepancy between the abstract model used to reason about the security of computer systems and...
When software is designed, even with security in mind, assumptions are made about the details of har...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Abstract—This paper investigates a novel attack vector against cryptography realized on FPGAs, which...
Hardware Trojans are an important threat to the security of integrated circuits. They assume a malic...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
In the last few years, security has become one of the key challenges in computing systems. Failures ...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
In the last years there has been a considerable growth on the number of users id on-line banking (Sz...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...