The complexity of modern processor architectures has given rise to sophisticated interactions among their components. Such interactions may result in potential attack vectors in terms of side channels, possibly available to userland exploits to leak secret data. Exploitation and countering of such side channels requires a detailed understanding of the target component. However, such detailed information is commonly unpublished for many CPUs. In this paper, we introduce the concept of Leakage Templates to abstractly describe specific side channels and identify their occurrences in binary applications. We design and implement PLUMBER, a framework to derive the generic Leakage Templates from individual code sequences that are known to cause...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Cache template attacks demonstrated automated leakage of user input in shared libraries. However, fo...
In the last years, a series of side channels have been discovered on CPUs. These side channels have ...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
International audienceSide-channel attacks of maximal efficiency require an accurate knowledge of th...
Formally bounding side-channel leakage is important to bridge the gap between the theory and practic...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Cache template attacks demonstrated automated leakage of user input in shared libraries. However, fo...
In the last years, a series of side channels have been discovered on CPUs. These side channels have ...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
International audienceSide-channel attacks of maximal efficiency require an accurate knowledge of th...
Formally bounding side-channel leakage is important to bridge the gap between the theory and practic...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...