As computer systems grow more and more complicated, various optimizations can unintentionally introduce security vulnerabilities in these systems. The vulnerabilities can lead to user information and data being compromised or stolen. In particular, the ending of both Moore\u27s law and Dennard scaling motivate the design of more exotic microarchitectural optimizations to extract more performance -- further exacerbating the security vulnerabilities. The performance optimizations often focus on sharing or re-using of hardware components within a processor, between different users or programs. Because of the sharing of the hardware, unintentional information leakage channels, through the shared components, can be created. Microarchitectural at...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
Modern processors rely heavily on speculation to provide performance. Techniques such as branch pred...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Historically, performance has been the most important feature when optimizing computer hardware. Mod...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
Modern processors rely heavily on speculation to provide performance. Techniques such as branch pred...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Historically, performance has been the most important feature when optimizing computer hardware. Mod...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
Modern processors rely heavily on speculation to provide performance. Techniques such as branch pred...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...