Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak confidential information through the timing of microarchitectural events. Many timing channel attacks are caused by the interference between different programs in the shared resources of a multi-core processor. For example, an attacker program's cache lines can be evicted by a victim program, which allows the attacker to infer secret information about the victim. Timing channel attacks pose serious threats to contemporary computing systems because they can bypass traditional defense mechanisms such as access control. Previous studies have even demonstrated a practical timing channel attack to recover the keystrokes of a user in the commercial ...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Microarchitectural timing side channels have been thoroughly investigated as a security threat in ha...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
A timing channel is a communication channel that can transfer information to a receiver/decoder by m...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...