Zobrazeno 1 - 10
of 91
pro vyhledávání: '"GENKIN, DANIEL"'
Autor:
Barthe, Gilles, Böhme, Marcel, Cauligi, Sunjay, Chuengsatiansup, Chitchanok, Genkin, Daniel, Guarnieri, Marco, Romero, David Mateos, Schwabe, Peter, Wu, David, Yarom, Yuval
How will future microarchitectures impact the security of existing cryptographic implementations? As we cannot keep reducing the size of transistors, chip vendors have started developing new microarchitectural optimizations to speed up computation. A
Externí odkaz:
http://arxiv.org/abs/2402.00641
Autor:
Kuepper, Joel, Erbsen, Andres, Gross, Jason, Conoly, Owen, Sun, Chuyue, Tian, Samuel, Wu, David, Chlipala, Adam, Chuengsatiansup, Chitchanok, Genkin, Daniel, Wagner, Markus, Yarom, Yuval
Manual engineering of high-performance implementations typically consumes many resources and requires in-depth knowledge of the hardware. Compilers try to address these problems; however, they are limited by design in what they can do. To address thi
Externí odkaz:
http://arxiv.org/abs/2305.19586
The drive to create thinner, lighter, and more energy efficient devices has resulted in modern SoCs being forced to balance a delicate tradeoff between power consumption, heat dissipation, and execution speed (i.e., frequency). While beneficial, thes
Externí odkaz:
http://arxiv.org/abs/2305.12784
A binary's behavior is greatly influenced by how the compiler builds its source code. Although most compiler configuration details are abstracted away during compilation, recovering them is useful for reverse engineering and program comprehension tas
Externí odkaz:
http://arxiv.org/abs/2305.03934
Autor:
Kuepper, Joel, Erbsen, Andres, Gross, Jason, Conoly, Owen, Sun, Chuyue, Tian, Samuel, Wu, David, Chlipala, Adam, Chuengsatiansup, Chitchanok, Genkin, Daniel, Wagner, Markus, Yarom, Yuval
Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language. However, cryptograp
Externí odkaz:
http://arxiv.org/abs/2211.10665
USB is the most prevalent peripheral interface in modern computer systems and its inherent insecurities make it an appealing attack vector. A well-known limitation of USB is that traffic is not encrypted. This allows on-path adversaries to trivially
Externí odkaz:
http://arxiv.org/abs/2211.01109
Autor:
Genkin, Daniel, Kosasih, William, Liu, Fangfei, Trikalinou, Anna, Unterluggauer, Thomas, Yarom, Yuval
Over the last two decades, the danger of sharing resources between programs has been repeatedly highlighted. Multiple side-channel attacks, which seek to exploit shared components for leaking information, have been devised, mostly targeting shared ca
Externí odkaz:
http://arxiv.org/abs/2201.11377
Autor:
Shusterman, Anatoly, Agarwal, Ayush, O'Connell, Sioli, Genkin, Daniel, Oren, Yossi, Yarom, Yuval
The "eternal war in cache" has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out
Externí odkaz:
http://arxiv.org/abs/2103.04952
Autor:
Genkin, Daniel, Zanette, Brandon, Grzela, Patrick, Benkert, Thomas, Subbarao, Padmaja, Moraes, Theo J., Katz, Sherri, Ratjen, Felix, Santyr, Giles, Kirby, Miranda
Publikováno v:
In Academic Radiology February 2024 31(2):648-659
Recent transient-execution attacks, such as RIDL, Fallout, and ZombieLoad, demonstrated that attackers can leak information while it transits through microarchitectural buffers. Named Microarchitectural Data Sampling (MDS) by Intel, these attacks are
Externí odkaz:
http://arxiv.org/abs/2006.13353