Microarchitectural attacks exploit target hardware properties to break software isolation techniques used by the processor. These attacks are extremely powerful and hard to detect since the determination of the program execution’s impact on the microarchitecture is at the same time not precisely understood and not easily observable at the software layer. Some approaches have attempted to benefit from existing hardware to better understand and detect the microarchitectural attacks (i.e., Hardware Performance Counters or Arm CoreSight), but such hardware was not meant to be used for cybersecurity, with reduced choice on observable signals and limited throughput of information. In this paper, we propose MATANA, an open and adaptive reconfigura...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceMicroarchitectural attacks exploit target hardware properties to break softwar...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
In recent years, computer systems have evolved quickly. This evolution concerns different layers of ...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceMicroarchitectural attacks exploit target hardware properties to break softwar...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
In recent years, computer systems have evolved quickly. This evolution concerns different layers of ...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...