An algorithm for detecting contention-based covert timing channels on shared hardware

J Chen, G Venkataramani - Proceedings of the Third Workshop on …, 2014 - dl.acm.org
As we increasingly rely on computers to process and manage our personal data,
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …

Load-step: A precise trustzone execution control framework for exploring new side-channel attacks like flush+ evict

Z Kou, W He, S Sinha, W Zhang - 2021 58th ACM/IEEE Design …, 2021 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are imported into processors to protect sensitive
programs against a potentially malicious operating system (OS), though, they are …

EvilCS: An Evaluation of Information Leakage through Context Switching on Security Enclaves

A Jayasena, R Bachmann… - 2024 Design, Automation …, 2024 - ieeexplore.ieee.org
Security enclaves provide isolated execution environments for trusted applications.
However, modern processors utilize diverse performance enhancement methods (eg …

Cc-hunter: Uncovering covert timing channels on shared processor hardware

J Chen, G Venkataramani - 2014 47th Annual IEEE/ACM …, 2014 - ieeexplore.ieee.org
As we increasingly rely on computers to process and manage our personal data,
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …

Reducing timing side-channel information leakage using 3D integration

C Bao, A Srivastava - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Recently, following the work pioneered by Kocher [1], using cache behavior as a timing side-
channel to leak critical system information has received lots of attentions because of its easy …

Beyond just safety: Delay-aware security monitoring for real-time control systems

M Hasan, S Mohan, RB Bobba… - ACM Transactions on …, 2022 - dl.acm.org
Modern embedded real-time systems (RTS) are increasingly facing more security threats
than the past. A simplistic straightforward integration of security mechanisms might not be …

An evaluation of bucketing in systems with non-deterministic timing behavior

YG Dantas, R Gay, T Hamann, H Mantel… - ICT Systems Security and …, 2018 - Springer
Timing side-channel vulnerabilities constitute a serious threat against privacy and
confidentiality of data. In this article, we study the effects of bucketing, a previously proposed …

Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks

S Adhikary, I Koley, S Maity… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
We present an ongoing work on countermeasure design against timing attacks specific to
real-time safety-critical Cyber Physical Systems (CPS). Such attacks use timing side …

Timing leaks and coarse-grained clocks

P Vasilikos, HR Nielson, F Nielson… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Timing-based side-channel attacks have matured from an academic exercise to a powerful
attack vector in the hand of real-world adversaries. A widely deployed countermeausure …

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …