Essays about: "microarchitectural attacks"

Found 5 essays containing the words microarchitectural attacks.

  1. 1. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE

  2. 2. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Franz Anton Fuchs; [2021]
    Keywords : ;

    Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE

  3. 3. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE

  4. 4. Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Maria Lindqvist; [2020]
    Keywords : microarchitectural attacks; cache attacks; side channel attacks; eviction set; cache memory;

    Abstract : Eviction sets are groups of memory addresses that map to the same cache set. They can be used to perform efficient information-leaking attacks against the cache memory, so-called cache side channel attacks. In this project, two different algorithms that find such sets are implemented and compared. READ MORE

  5. 5. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Gunnar Grimsdal; Patrik Lundgren; [2019]
    Keywords : Genode; Meltdown; Spectre; Nova; Okl4; microarchitectural attacks; microkernel;

    Abstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE