A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Peeking behind the curtains of serverless platforms
Serverless computing is an emerging paradigm in which an application's resource
provisioning and scaling are managed by third-party services. Examples include AWS …
provisioning and scaling are managed by third-party services. Examples include AWS …
Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Sponge examples: Energy-latency attacks on neural networks
The high energy costs of neural network training and inference led to the use of acceleration
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …
[PDF][PDF] Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Covert channels evade isolation mechanisms between multiple parties in the cloud.
Especially cache covert channels allow the transmission of several hundred kilobits per …
Especially cache covert channels allow the transmission of several hundred kilobits per …
Cache attacks enable bulk key recovery on the cloud
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …
data is easily trusted to cloud, security critical data and applications are not. The main …
Jolt: Recovering tls signing keys via rowhammer faults
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
Containerleaks: Emerging security threats of information leakages in container clouds
Container technology provides a lightweight operating system level virtual hosting
environment. Its emergence profoundly changes the development and deployment …
environment. Its emergence profoundly changes the development and deployment …
A survey of side-channel attacks on caches and countermeasures
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …
trustworthiness are key considerations in designing computing devices. A vast majority of …