L Hetterich, M Schwarz - … Conference on Detection of Intrusions and …, 2022 - Springer
Since the disclosure of Spectre, extensive research has been conducted on both new attacks, attack variants, and mitigations. However, most research focuses on× 86 CPUs, with …
W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential information leaks, with devastating implications on security. Over the last decade, multiple …
CPU port contention has been used in the last years as a stateless side channel to perform side-channel attacks and transient execution attacks. One drawback of this channel is that it …
Rust is a popular memory-safe systems programming language. In order to interact with hardware or call into non-Rust libraries, Rust provides unsafe language features that shift …
Many security attacks utilize cache side-channels to subvert memory security mechanisms. By exploiting co-resident processes that share the cache, attackers simply monitor and …
M Schwarzl, E Kraft, D Gruss - arXiv preprint arXiv:2208.02093, 2022 - arxiv.org
Cache template attacks demonstrated automated leakage of user input in shared libraries. However, for large binaries, the runtime is prohibitively high. Other automated approaches …
Mounting microarchitectural attacks, such as Spectre or Rowhammer, is possible from browsers. However, to be realistically exploitable, they require precise knowledge about …
Providing secure systems, for example, in computing centers, is an essential task of service providers. Vulnerabilities threatening secure execution are not only located in defective …
Abstract” AnewKubernetesoperatorarchitecture, basedonWebAssembly, canreducethecontrolplanememoryoverhea… the orchestrator a better fit for low-resource environments while offering a cost-reduction for …