Zobrazeno 1 - 10
of 121
pro vyhledávání: '"Güneysu, Tim"'
Security engineering, from security requirements engineering to the implementation of cryptographic protocols, is often supported by domain-specific languages (DSLs). Unfortunately, a lack of knowledge about these DSLs, such as which security aspects
Externí odkaz:
http://arxiv.org/abs/2408.06219
Autor:
Peters, Moritz, Gaudin, Nicolas, Thoma, Jan Philipp, Lapôtre, Vianney, Cotret, Pascal, Gogniat, Guy, Güneysu, Tim
Randomizing the mapping of addresses to cache entries has proven to be an effective technique for hardening caches against contention-based attacks like Prime+Prome. While attacks and defenses are still evolving, it is clear that randomized caches si
Externí odkaz:
http://arxiv.org/abs/2312.06235
Autor:
Thoma, Jan Philipp, Güneysu, Tim
There is a long history of side channels in the memory hierarchy of modern CPUs. Especially the cache side channel is widely used in the context of transient execution attacks and covert channels. Therefore, many secure cache architectures have been
Externí odkaz:
http://arxiv.org/abs/2209.01894
Autor:
Thoma, Jan Philipp, Niesler, Christian, Funke, Dominic, Leander, Gregor, Mayr, Pierre, Pohl, Nils, Davi, Lucas, Güneysu, Tim
In the recent past, we have witnessed the shift towards attacks on the microarchitectural CPU level. In particular, cache side-channels play a predominant role as they allow an attacker to exfiltrate secret information by exploiting the CPU microarch
Externí odkaz:
http://arxiv.org/abs/2104.11469
Recent research has revealed an ever-growing class of microarchitectural attacks that exploit speculative execution, a standard feature in modern processors. Proposed and deployed countermeasures involve a variety of compiler updates, firmware update
Externí odkaz:
http://arxiv.org/abs/2007.15919
Side-Channel Attacks (SCAs) are a powerful method to attack implementations of cryptographic algorithms. State-of-the-art techniques such as template attacks and stochastic models usually require a lot of manual preprocessing and feature extraction b
Externí odkaz:
http://arxiv.org/abs/2004.11015
Autor:
Knechtel, Johann, Kavun, Elif Bilge, Regazzoni, Francesco, Heuser, Annelie, Chattopadhyay, Anupam, Mukhopadhyay, Debdeep, Dey, Soumyajit, Fei, Yunsi, Belenky, Yaacov, Levi, Itamar, Güneysu, Tim, Schaumont, Patrick, Polian, Ilia
Modern electronic systems become evermore complex, yet remain modular, with integrated circuits (ICs) acting as versatile hardware components at their heart. Electronic design automation (EDA) for ICs has focused traditionally on power, performance,
Externí odkaz:
http://arxiv.org/abs/2001.09672
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.