The continuous quest for performance pushed processors to incorporate elements such as multiple cores, caches, acceleration units, or speculative execution that make systems very complex. On the other hand, these features often expose unexpected vulnerabilities that pose new challenges. For example, the timing differences introduced by caches or speculative execution can be exploited to leak information or detect activity patterns. Protecting embedded systems from existing attacks is extremely challenging, and it is made even harder by the continuous rise of new microarchitectural attacks (e.g., the Spectre and Orchestration attacks). In this article, we present a new approach based on count-min sketches for detecting microarchitectural att...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...