A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Peeking behind the curtains of serverless platforms

L Wang, M Li, Y Zhang, T Ristenpart… - 2018 USENIX annual …, 2018 - usenix.org
Serverless computing is an emerging paradigm in which an application's resource
provisioning and scaling are managed by third-party services. Examples include AWS …

Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures

M Yan, CW Fletcher, J Torrellas - 29th USENIX Security Symposium …, 2020 - usenix.org
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Sponge examples: Energy-latency attacks on neural networks

I Shumailov, Y Zhao, D Bates… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The high energy costs of neural network training and inference led to the use of acceleration
hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural …

[PDF][PDF] Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.

C Maurice, M Weber, M Schwarz, L Giner, D Gruss… - NDSS, 2017 - cmaurice.fr
Covert channels evade isolation mechanisms between multiple parties in the cloud.
Especially cache covert channels allow the transmission of several hundred kilobits per …

Cache attacks enable bulk key recovery on the cloud

MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth… - … and Embedded Systems …, 2016 - Springer
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …

Jolt: Recovering tls signing keys via rowhammer faults

K Mus, Y Doröz, MC Tol, K Rahman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …

Containerleaks: Emerging security threats of information leakages in container clouds

X Gao, Z Gu, M Kayaalp, D Pendarakis… - 2017 47th Annual …, 2017 - ieeexplore.ieee.org
Container technology provides a lightweight operating system level virtual hosting
environment. Its emergence profoundly changes the development and deployment …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …