Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in diverse settings such as desktops, clouds, and mobile systems. These attacks observe events on different shared resources on the memory hierarchy from timing information, and then infer secret-dependent memory access pattern to retrieve the secret through statistical analysis. We generalize these attacks as memory-based side-channel attacks. In this paper, we propose a novel software countermeasure, MemPoline, against memory-based side-channel attacks. MemPoline hides the secret-dependent memory access pattern by moving sensitive data around randomly within a memory space. Compared to the prior oblivious RAM technology, MemPoline employs param...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
The discrepancy between the abstract model used to reason about the security of computer systems and...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
The discrepancy between the abstract model used to reason about the security of computer systems and...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...