© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware security crisis brought on by recent speculative execution attacks has shown that it is crucial to adopt a security-conscious approach to architecture research, analyzing the security of promising architectural techniques before they are deployed in hardware. This paper offers the first security analysis of cache compression, one such promising technique that is likely to appear in future processors. We find that cache compression is insecure because the compressibility of a cache line reveals information about its contents. Compressed caches introduce a new side channel that is especially insidious, as simply storing data transmits information ab...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Privacy protection is an essential part of information security. The use of shared resources demands...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceSide channels and covert channels can give untrusted applications access to th...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Privacy protection is an essential part of information security. The use of shared resources demands...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceSide channels and covert channels can give untrusted applications access to th...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...