Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Maurice, Clémentine"'
Autor:
Geimer, Antoine, Vergnolle, Mathéo, Recoules, Frédéric, Daniel, Lesly-Ann, Bardin, Sébastien, Maurice, Clémentine
To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As these can be error-prone, many side-channel detection tools have been proposed. Despite this, such vulnerabiliti
Externí odkaz:
http://arxiv.org/abs/2310.08153
Autor:
Laor, Tomer, Mehanna, Naif, Durey, Antonin, Dyadyuk, Vitaly, Laperdrix, Pierre, Maurice, Clémentine, Oren, Yossi, Rouvoy, Romain, Rudametkin, Walter, Yarom, Yuval
Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification
Externí odkaz:
http://arxiv.org/abs/2201.09956
Autor:
Lipp, Moritz, Aga, Misiker Tadesse, Schwarz, Michael, Gruss, Daniel, Maurice, Clémentine, Raab, Lukas, Lamster, Lukas
A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer a
Externí odkaz:
http://arxiv.org/abs/1805.04956
Autor:
Schwarz, Michael, Gruss, Daniel, Lipp, Moritz, Maurice, Clémentine, Schuster, Thomas, Fogh, Anders, Mangard, Stefan
Double-fetch bugs are a special type of race condition, where an unprivileged execution thread is able to change a memory location between the time-of-check and time-of-use of a privileged execution thread. If an unprivileged attacker changes the val
Externí odkaz:
http://arxiv.org/abs/1711.01254
Autor:
Maurice, Clémentine
Dans un environnement virtualisé, l'hyperviseur fournit l'isolation au niveau logiciel, mais l'infrastructure partagée rend possible des attaques au niveau matériel. Les attaques par canaux auxiliaires ainsi que les canaux cachés sont des problè
Externí odkaz:
http://www.theses.fr/2015ENST0070/document
Autor:
Schwarz, Michael, Lipp, Moritz, Gruss, Daniel, Weiser, Samuel, Maurice, Clémentine, Spreitzer, Raphael, Mangard, Stefan
Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously pro
Externí odkaz:
http://arxiv.org/abs/1706.06381
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same
Externí odkaz:
http://arxiv.org/abs/1702.08719
In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the
Externí odkaz:
http://arxiv.org/abs/1511.08756
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core A
Externí odkaz:
http://arxiv.org/abs/1511.04897