Survey of microarchitectural side and covert channels, attacks, and defenses

J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …

{DRAMA}: Exploiting {DRAM} addressing for {Cross-CPU} attacks

P Pessl, D Gruss, C Maurice, M Schwarz… - 25th USENIX security …, 2016 - usenix.org
In cloud computing environments, multiple tenants are often co-located on the same multi-
processor system. Thus, preventing information leakage between tenants is crucial. While …

An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …

Cc-hunter: Uncovering covert timing channels on shared processor hardware

J Chen, G Venkataramani - 2014 47th Annual IEEE/ACM …, 2014 - ieeexplore.ieee.org
As we increasingly rely on computers to process and manage our personal data,
safeguarding sensitive information from malicious hackers is a fast growing concern. Among …

Timing channel protection for a shared memory controller

Y Wang, A Ferraiuolo, GE Suh - 2014 IEEE 20th International …, 2014 - ieeexplore.ieee.org
This paper proposes a new memory controller design that enables secure sharing of main
memory among mutually mistrusting parties by eliminating memory timing channels. This …

Security and privacy in cloud computing

Z Tari - IEEE Cloud Computing, 2014 - computer.org
Security and Privacy in Cloud Computing Toggle navigation IEEE Computer Society Digital
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE …

Understanding and mitigating covert channels through branch predictors

D Evtyushkin, D Ponomarev… - ACM Transactions on …, 2016 - dl.acm.org
Covert channels through shared processor resources provide secret communication
between two malicious processes: the trojan and the spy. In this article, we classify, analyze …

DFS covert channels on multi-core platforms

M Alagappan, J Rajendran… - 2017 IFIP/IEEE …, 2017 - ieeexplore.ieee.org
Covert channels provide a secret communication medium between two malicious processes
to exfiltrate information stealthily that violates the security policy of a system. In this paper …

Covert channels through branch predictors: a feasibility study

D Evtyushkin, D Ponomarev… - Proceedings of the fourth …, 2015 - dl.acm.org
Covert channels through shared processor resources provide secret communication
between malicious processes. In this paper, we introduce a new mechanism for covert …

Avoiding information leakage in the memory controller with fixed service policies

A Shafiee, A Gundu, M Shevgoor… - Proceedings of the 48th …, 2015 - dl.acm.org
Trusted applications frequently execute in tandem with untrusted applications on personal
devices and in cloud environments. Since these co-scheduled applications share hardware …