Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant cloud servers to low-power mobile platforms. The denser integration of CPUs creates an opportunity for great economic savings achieved by packing processes of multiple tenants or by bundling all kinds of tasks at vari- ous privilege levels to share the same platform. This level of sharing carries with it a serious risk of leaking sensitive information through the shared microarchitectural compo- nents. Microarchitectural attacks initially only exploited core-private resources, but were quickly generalized to re- sources shared within the CPU. We present the first fine grain side channel attack that works across p...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Computing system security is important for everyday functioning of society, among other things. We s...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Abstract. Cloud computing relies on hypervisors to isolate virtual ma-chines running on shared hardw...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thir...
Privacy protection is an essential part of information security. The use of shared resources demands...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thi...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Abstract—The cloud computing infrastructure relies on virtu-alized servers that provide isolation ac...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Computing system security is important for everyday functioning of society, among other things. We s...
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance....
Abstract. Cloud computing relies on hypervisors to isolate virtual ma-chines running on shared hardw...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thir...
Privacy protection is an essential part of information security. The use of shared resources demands...
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of thi...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Abstract—The cloud computing infrastructure relies on virtu-alized servers that provide isolation ac...
Sharing memory pages between non-trusting processes is a common method of reducing the memory footpr...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...