A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges

B Asvija, R Eswari, MB Bijoy - Computer Networks, 2019 - Elsevier
The advantages of virtualization technology have resulted in its wide spread adoption in
cloud computing infrastructures. However it has also introduced a new set of security threats …

A survey on accelerating technologies for fast network packet processing in Linux environments

E Freitas, AT de Oliveira Filho, PRX do Carmo… - Computer …, 2022 - Elsevier
The path a packet takes when handled by the Linux Kernel has been well established for a
long time. Its overhead/bottleneck issues are also known. Nonetheless, complexity has …

Amplifying side channels through performance degradation

T Allan, BB Brumley, K Falkner, J Van de Pol… - Proceedings of the …, 2016 - dl.acm.org
Interference between processes executing on shared hardware can be used to mount
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …

Counting with tinytable: Every bit counts!

G Einziger, R Friedman - … of the 17th International Conference on …, 2016 - dl.acm.org
Counting Bloom filters (CBF) and their variants are data structures that support membership
or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory …

Security threat modelling with bayesian networks and sensitivity analysis for IAAS virtualization stack

B Asvija, R Eswari, MB Bijoy - Journal of Organizational and End …, 2021 - igi-global.com
Designing security mechanisms for cloud computing infrastructures has assumed
importance with the widespread adoption of public clouds. Virtualization security is a crucial …

Bayesian attack graphs for platform virtualized infrastructures in clouds

B Asvija, R Eswari, MB Bijoy - Journal of Information Security and …, 2020 - Elsevier
Virtualization security is an important aspect to be carefully addressed while provisioning
cloud services. In this paper, we propose a novel model using Bayesian Attack Graphs …

Securing {Self-Virtualizing} Ethernet Devices

I Smolyar, M Ben-Yehuda, D Tsafrir - 24th USENIX Security Symposium …, 2015 - usenix.org
Single root I/O virtualization (SRIOV) is a hardware/software interface that allows devices to
“self virtualize” and thereby remove the host from the critical I/O path. SRIOV thus brings …

Security is an architectural design constraint

P Ravi, Z Najm, S Bhasin, M Khairallah… - Microprocessors and …, 2019 - Elsevier
In state-of-the-art design paradigm, time, space and power efficiency are considered the
primary design constraints. Quite often, this approach adversely impacts the security of the …

Hardware virtualization support for shared resources in mixed-criticality multicore systems

O Sander, T Sandmann, VV Duy, S Bähr… - … , Automation & Test …, 2014 - ieeexplore.ieee.org
Electric/Electronic architectures in modern automobiles evolve towards an hierachical
approach where functionalities from several ECUs are consolidated into few domain …