In this paper we analyze three methods to detect cache-based side-channel attacks in real time, preventing or limiting the amount of leaked information. Two of the three methods are based on machine learning techniques and all the three of them can successfully detect an attack in about one fifth of the time required to complete it. We could not experience the presence of false positives in our test environment and the overhead caused by the detection systems is negligible. We also analyze how the detection systems behave with a modified version of one of the spy processes. With some optimization we are confident these systems can be used in real world scenarios
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
International audienceResearch on cache-based side-channel attacks shows the security impact of thes...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
International audienceHigh resolution and stealthy attacks and their variants such as Flush+Reload, ...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...