Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elegant encryption algorithms. Even though there exist various defense mechanisms, most of them come with the extra overhead of implementation. Recent studies have prevented some particular categories of these attacks but fail to address the detection of other classes. This paper presents a generic machine learning based multi-layer detection approach targeting these micro-architectural side-channel-attacks, without concentrating on a single category. The proposed approach work by proling low-level hardware events using Linux perf event API and then by analyzing these data with some appropriate machine learning techniques. This paper also presents...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing repl...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new ar...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...