Measuring information leakage in website fingerprinting attacks and defenses

S Li, H Guo, N Hopper - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Tor provides low-latency anonymous and uncensored network access against a local or
network adversary. Due to the design choice to minimize traffic overhead (and increase the …

Time protection: the missing OS abstraction

Q Ge, Y Yarom, T Chothia, G Heiser - Proceedings of the Fourteenth …, 2019 - dl.acm.org
Timing channels enable data leakage that threatens the security of computer systems, from
cloud platforms to smartphones and browsers executing untrusted third-party code …

Wf-transformer: Learning temporal features for accurate anonymous traffic identification by using transformer networks

Q Zhou, L Wang, H Zhu, T Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Website Fingerprinting (WF) is a network traffic mining technique for anonymous traffic
identification, which enables a local adversary to identify the target website that an …

[PDF][PDF] BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect

C Rodrigues, D Oliveira, S Pinto - 2024 IEEE Symposium on Security …, 2023 - crosscon.eu
Spectre and Meltdown have pushed the research community toward an otherwise-
unavailable understanding of the security implications of processors' microarchitecture …

Leakwatch: Estimating information leakage from java programs

T Chothia, Y Kawamoto, C Novakovic - … 7-11, 2014. Proceedings, Part II …, 2014 - Springer
Programs that process secret data may inadvertently reveal information about those secrets
in their publicly-observable output. This paper presents LeakWatch, a quantitative …

Prevention of microarchitectural covert channels on an open-source 64-bit RISC-V core

N Wistoff, M Schneider, FK Gürkaynak, L Benini… - arXiv preprint arXiv …, 2020 - arxiv.org
Covert channels enable information leakage across security boundaries of the operating
system. Microarchitectural covert channels exploit changes in execution timing resulting …

F-BLEAU: fast black-box leakage estimation

G Cherubin, K Chatzikokolakis… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We consider the problem of measuring how much a system reveals about its secret inputs.
We work in the black-box setting: we assume no prior knowledge of the system's internals …

Systematic prevention of on-core timing channels by full temporal partitioning

N Wistoff, M Schneider, FK Gürkaynak… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Microarchitectural timing channels enable unwanted information flow across security
boundaries, violating fundamental security assumptions. They leverage timing variations of …

Decision support for sharing data using differential privacy

MFS John, G Denker, P Laud, K Martiny… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Owners of data may wish to share some statistics with others, but they may be worried of
privacy of the underlying data. An effective solution to this problem is to employ provable …

Joint secure communication and sensing in 6G networks

M Mitev, A Mayya, A Chorti - arXiv preprint arXiv:2310.14624, 2023 - arxiv.org
Joint communication and sensing is expected to be one of the features introduced by the
sixth-generation (6G) wireless systems. This will enable a huge variety of new applications …