Performance has been and will continue to be a key criterion in the development of computer systems for a long time. To speed up Central Processing Units (CPUs), micro-architectural components like, e.g., caches and instruction pipelines have been developed. While caches are indispensable from a performance perspective, they also introduce a security risk. If the interaction of a software implementation with a cache differs depending on the data processed by the software, an attacker who observes this interaction can deduce information about the processed data. If the dependence is unintentional, it is called a cache side channel. Cache side channels have been exploited to recover entire secret keys from numerous cryptographic implementatio...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Hardware side channel vulnerabilities have been studied for many years in embedded silicon-security ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signa...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Over the last decades the digitalization has become an integral part of daily life. Computer system...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Hardware side channel vulnerabilities have been studied for many years in embedded silicon-security ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signa...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Over the last decades the digitalization has become an integral part of daily life. Computer system...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...