An algorithm for detecting contention-based covert timing channels on shared hardware
J Chen, G Venkataramani - Proceedings of the Third Workshop on …, 2014 - dl.acm.org
As we increasingly rely on computers to process and manage our personal data,
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …
Load-step: A precise trustzone execution control framework for exploring new side-channel attacks like flush+ evict
Trusted execution environments (TEEs) are imported into processors to protect sensitive
programs against a potentially malicious operating system (OS), though, they are …
programs against a potentially malicious operating system (OS), though, they are …
EvilCS: An Evaluation of Information Leakage through Context Switching on Security Enclaves
A Jayasena, R Bachmann… - 2024 Design, Automation …, 2024 - ieeexplore.ieee.org
Security enclaves provide isolated execution environments for trusted applications.
However, modern processors utilize diverse performance enhancement methods (eg …
However, modern processors utilize diverse performance enhancement methods (eg …
Cc-hunter: Uncovering covert timing channels on shared processor hardware
J Chen, G Venkataramani - 2014 47th Annual IEEE/ACM …, 2014 - ieeexplore.ieee.org
As we increasingly rely on computers to process and manage our personal data,
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …
Reducing timing side-channel information leakage using 3D integration
C Bao, A Srivastava - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Recently, following the work pioneered by Kocher [1], using cache behavior as a timing side-
channel to leak critical system information has received lots of attentions because of its easy …
channel to leak critical system information has received lots of attentions because of its easy …
Beyond just safety: Delay-aware security monitoring for real-time control systems
Modern embedded real-time systems (RTS) are increasingly facing more security threats
than the past. A simplistic straightforward integration of security mechanisms might not be …
than the past. A simplistic straightforward integration of security mechanisms might not be …
An evaluation of bucketing in systems with non-deterministic timing behavior
Timing side-channel vulnerabilities constitute a serious threat against privacy and
confidentiality of data. In this article, we study the effects of bucketing, a previously proposed …
confidentiality of data. In this article, we study the effects of bucketing, a previously proposed …
Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks
We present an ongoing work on countermeasure design against timing attacks specific to
real-time safety-critical Cyber Physical Systems (CPS). Such attacks use timing side …
real-time safety-critical Cyber Physical Systems (CPS). Such attacks use timing side …
Timing leaks and coarse-grained clocks
Timing-based side-channel attacks have matured from an academic exercise to a powerful
attack vector in the hand of real-world adversaries. A widely deployed countermeausure …
attack vector in the hand of real-world adversaries. A widely deployed countermeausure …
Maximizing the security level of real-time software while preserving temporal constraints
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …
(IoT) and edge computing domains, where they are often employed as the control entity of a …