We introduce the usage of hardware performance counters (HPCs) as a new method that allows very precise access to known side channels and also allows access to many new side channels. Many current architectures provide hardware performance counters, which allow the profiling of software during runtime. Though they allow detailed profiling they are noisy by their very nature; HPC hardware is not validated along with the rest of the microprocessor. They are meant to serve as a relative measure and are most commonly used for profiling software projects or operating systems. We discuss this security model and we show first implementation results, which confirm that HPCs can be used to profile relatively short sequences of instructions with high...
Hardware performance monitoring counters have recently received a lot of attention. They have been u...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Modern processors incorporate several performance monitoring units, which can be used to count event...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
International audienceHardware performance monitoring counters have recently received a lot of atten...
International audienceHardware performance monitoring counters have recently received a lot of atten...
International audienceHardware performance monitoring counters have recently received a lot of atten...
A new approach for detecting security attacks on real-time embedded applications by using ...
Hardware performance monitoring counters have recently received a lot of attention. They have been u...
Hardware performance monitoring counters have recently received a lot of attention. They have been u...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Modern processors incorporate several performance monitoring units, which can be used to count event...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
International audienceHardware performance monitoring counters have recently received a lot of atten...
International audienceHardware performance monitoring counters have recently received a lot of atten...
International audienceHardware performance monitoring counters have recently received a lot of atten...
A new approach for detecting security attacks on real-time embedded applications by using ...
Hardware performance monitoring counters have recently received a lot of attention. They have been u...
Hardware performance monitoring counters have recently received a lot of attention. They have been u...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Modern processors incorporate several performance monitoring units, which can be used to count event...