Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and power consumption in modern processors. Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly. For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage. In this paper, we demonstrate that these privileged interfaces can be reliably exploited to undermine the system’s security. We present the Plundervolt attack, in which a privileged software adversary abuses an undocum...
CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security im...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Modern CPUs adapt clock frequencies and voltage levels to workloads to reduce energy consumption and...
The need for energy optimizations in modern systems forces CPU vendors to provide Dynamic Voltage Fr...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
Power side-channel attacks exploit variations in power consumption to extract secrets from a device,...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment o...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security im...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Modern CPUs adapt clock frequencies and voltage levels to workloads to reduce energy consumption and...
The need for energy optimizations in modern systems forces CPU vendors to provide Dynamic Voltage Fr...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
Power side-channel attacks exploit variations in power consumption to extract secrets from a device,...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment o...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security im...
Unpredictable hardware faults and software bugs lead to application crashes, incorrect computations,...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...