International audienceMicroarchitectural attacks exploit target hardware properties to break software isolation techniques used by the processor. These attacks are extremely powerful and hard to detect since the determination of the program execution’s impact on the microarchitecture is at the same time not precisely understood and not easily observable at the software layer. Some approaches have attempted to benefit from existing hardware to better understand and detect the microarchitectural attacks (i.e., Hardware Performance Counters or Arm CoreSight), but such hardware was not meant to be used for cybersecurity, with reduced choice on observable signals and limited throughput of information. In this paper, we propose MATANA, an open an...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceMicroarchitectural attacks exploit target hardware properties to break softwar...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
In recent years, computer systems have evolved quickly. This evolution concerns different layers of ...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceMicroarchitectural attacks exploit target hardware properties to break softwar...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
In recent years, computer systems have evolved quickly. This evolution concerns different layers of ...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceCache side-channel attacks consist, for a malicious process, to infer the curr...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...