Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work. In this project, we develop a set of tools to generate a dataset; and a dataset that will allow the use of Machine Learning techniques to detect Spectre and Meltdown attacks (i.e. using a cache side-channel). When released, this dataset will enable researchers to compare their ML-based detection proposals based on the same dataset (which is not currently the case). Also, it eliminates the need of an infected computer to generate the attacks and the corresponding dataset for su...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cloud computing is based on the sharing of physical resources among several virtual machines through...
Cloud computing is an important technology that significantly reduces costs and increases operations...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cloud computing is based on the sharing of physical resources among several virtual machines through...
Cloud computing is an important technology that significantly reduces costs and increases operations...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
We present a kernel-level infrastructure which allows to perform system-wide detection of malicious ...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cloud computing is based on the sharing of physical resources among several virtual machines through...
Cloud computing is an important technology that significantly reduces costs and increases operations...