Essays about: "microarchitectural attacks"
Found 5 essays containing the words microarchitectural attacks.
-
1. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE
-
2. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE
-
3. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE
-
4. Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Eviction sets are groups of memory addresses that map to the same cache set. They can be used to perform efficient information-leaking attacks against the cache memory, so-called cache side channel attacks. In this project, two different algorithms that find such sets are implemented and compared. READ MORE
-
5. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE