Ben Gras
YOU?
Author Swipe
View article: NetCAT: Practical Cache Attacks from the Network
NetCAT: Practical Cache Attacks from the Network Open
Increased peripheral performance is causing strain on the memory subsystem of modern processors. For example, available DRAM throughput can no longer sustain the traffic of a modern network card. Scrambling to deliver the promised performa…
View article: ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures Open
The past decade has seen a plethora of side-channelattacks on various CPU components. Each new attack typicallyfollows a whitebox analysis approach, which involves (i) identify-ing a specific shared CPU component, (ii) reversing its behavi…
View article: Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks
Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks Open
To stop side channel attacks on CPU caches that have allowed attackers to leak secret information and break basic security mechanisms, the security community has developed a variety of powerful defenses that effectively isolate the securit…
View article: RevAnC
RevAnC Open
Recent hardware-based attacks that compromise systems with Rowhammer or bypass address-space layout random- ization rely on how the processor's memory management unit (MMU) interacts with page tables. These attacks often need to reload pag…