Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and research directions

J Santos, T Wauters, B Volckaert… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The advent of softwarized networks has enabled the deployment of chains of virtual network
and service components on computational resources from the cloud up to the edge, creating …

Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …

Lest we remember: cold-boot attacks on encryption keys

JA Halderman, SD Schoen, N Heninger… - Communications of the …, 2009 - dl.acm.org
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …

Predicting secret keys via branch prediction

O Acıiçmez, ÇK Koç, JP Seifert - Topics in Cryptology–CT-RSA 2007: The …, 2006 - Springer
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …

On the power of simple branch prediction analysis

O Aciiçmez, ÇK Koç, JP Seifert - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …

[HTML][HTML] Distributed usage control

A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …

Bootstrapping trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Software mitigations to hedge AES against cache-based software side channel vulnerabilities

E Brickell, G Graunke, M Neve, JP Seifert - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Hardware side channel vulnerabilities have been studied for many years in embedded
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …

AEGIS: A single-chip secure processor

GE Suh, CW O'Donnell, S Devadas - Information Security Technical Report, 2005 - Elsevier
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …

On obligations

M Hilty, D Basin, A Pretschner - … on Research in Computer Security, Milan …, 2005 - Springer
Access control is concerned with granting access to sensitive data based on conditions that
relate to the past or present, so-called provisions. Expressing requirements from the domain …