Cache template attacks demonstrated automated leakage of user input in shared libraries. However, for large binaries, the runtime is prohibitively high. Other automated approaches focused on cryptographic implementations and media software but are not directly applicable to user input. Hence, discovering and eliminating all user input side-channel leakage on a cache-line granularity within huge code bases are impractical. In this paper, we present a new generic cache template attack technique, LBTA, layered binary templating attacks. LBTA uses multiple coarser-grained side channel layers as an extension to cache-line granularity templating to speed up the runtime of cache templating attacks. We describe LBTA with a variable number of laye...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Recent work on cache attacks has shown that CPU caches represent a powerful source of information le...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
In this dissertation we study some of the problems arising on computer systems that leak information...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Recent work on cache attacks has shown that CPU caches represent a powerful source of information le...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
In this dissertation we study some of the problems arising on computer systems that leak information...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...