Samuel Weiser
YOU?
Author Swipe
View article: Practical Enclave Malware with Intel SGX
Practical Enclave Malware with Intel SGX Open
Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel's threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat …
View article: TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V Open
Embedded computing devices are used on a large scale in the emerging internet of things (IoT).However, their wide deployment raises the incentive for attackers to target these devices, as demonstrated by several recent attacks.As IoT devic…
View article: KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks Open
Besides cryptographic secrets, software-based side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and…
View article: DEPENDABLE INTERNET OF THINGS FOR NETWORKED CARS
DEPENDABLE INTERNET OF THINGS FOR NETWORKED CARS Open
The Internet of Things (IoT) extends the Internet to include also wireless embedded computers that are often equipped with sensors and actuators to monitor and control their physical environment. The IoT is increasingly used for safety-cri…
View article: KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks Open
Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Pre…
View article: Malware Guard Extension: Using SGX to Conceal Cache Attacks
Malware Guard Extension: Using SGX to Conceal Cache Attacks Open
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located o…