Schedguard++: Protecting against schedule leaks using linux containers on multi-core processors
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous
driving system. It has been recently shown that these systems can be vulnerable to timing …
driving system. It has been recently shown that these systems can be vulnerable to timing …
Defense against microarchitecture side-channel attacks through runtime detection, isolation and prevention
A Javeed - 2022 - research.sabanciuniv.edu
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from a computing …
the most novel and thought-provoking attacks to exfiltrate information from a computing …
Logs and side channels
HB Lee - 2023 - ideals.illinois.edu
While system administrators would prefer to configure their systems so that their loggers
capture as much details as possible, such details may include sensitive information. In …
capture as much details as possible, such details may include sensitive information. In …
Who's Afraid of Butterflies? A Close Examination of the Butterfly Attack
The Butterfly Attack, introduced in an RTSS 2019 paper, was billed as a new kind of timing
attack against control loops in cyber-physical systems. We conduct a close inspection of the …
attack against control loops in cyber-physical systems. We conduct a close inspection of the …
Hardware Specification Aware Timing Side Channel Security Analysis
Most software programs in modern Internet-of-Things (IoT) systems in diverse domains such
as healthcare, smart cities, banking, and industrial automation deal with secret data/assets …
as healthcare, smart cities, banking, and industrial automation deal with secret data/assets …
Secure Analytics for Embedded Systems through Machine Learning Applications using TrustZones
C Rookard, A Crabtree, JD Trujillo… - 2022 IEEE 13th …, 2022 - ieeexplore.ieee.org
With the advent of edge computing, there has been a substantial growth of connected
devices. Several of these devices, including internet-of-things (IoT), smartphones …
devices. Several of these devices, including internet-of-things (IoT), smartphones …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
A New Covert Channel in Fixed-Priority Real-Time Multiframe Tasks
This study investigates the presence of illicit information flows in fixed-priority multiframe real-
time systems. We identify an algorithmic covert channel (called FrameLeaker) that enables a …
time systems. We identify an algorithmic covert channel (called FrameLeaker) that enables a …
Retrofitting the partially privileged mode for TEE communication channel protection
ARM TrustZone provides a Trusted Execution Environment (TEE) to isolate security-critical
services, which are generally invoked from the Rich Execution Environment (REE) through a …
services, which are generally invoked from the Rich Execution Environment (REE) through a …
Thermware: Toward side-channel defense for tiny iot devices
As malware in IoT devices flourishes, defenses are lacking. Traditional antivirus or intrusion
detection-based defense techniques fail for the limited computational capabilities and the …
detection-based defense techniques fail for the limited computational capabilities and the …