Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and research directions
The advent of softwarized networks has enabled the deployment of chains of virtual network
and service components on computational resources from the cloud up to the edge, creating …
and service components on computational resources from the cloud up to the edge, creating …
Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing
YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …
implementations, and their targets range from primitives, protocols, modules, and devices to …
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger… - Communications of the …, 2009 - dl.acm.org
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …
modern computers, retains its contents for several seconds after power is lost, even at room …
Predicting secret keys via branch prediction
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
On the power of simple branch prediction analysis
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …
attack, has been discovered and also demonstrated to be practically feasible on popular …
[HTML][HTML] Distributed usage control
A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
Bootstrapping trust in commodity computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
E Brickell, G Graunke, M Neve, JP Seifert - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Hardware side channel vulnerabilities have been studied for many years in embedded
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …
AEGIS: A single-chip secure processor
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …
applications by ensuring private and authentic program execution even in the face of …
On obligations
M Hilty, D Basin, A Pretschner - … on Research in Computer Security, Milan …, 2005 - Springer
Access control is concerned with granting access to sensitive data based on conditions that
relate to the past or present, so-called provisions. Expressing requirements from the domain …
relate to the past or present, so-called provisions. Expressing requirements from the domain …