In this paper we analyze three methods to detect cache-based side-channel attacks in real time, preventing or limiting the amount of leaked information. Two of the three methods are based on machine learning techniques and all the three of them can successfully detect an attacker in about one fifth of the time required to complete the attack. There were no false positives in our test environment. Moreover we could not measure a change in the execution time of the processes involved in the attack, meaning there is no perceivable overhead. We also analyze how the detection systems behave with a modified version of one of the spy processes. With some optimization we are confident these systems can be used in real world scenarios
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elega...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...