Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …
decade. These counters can be used to monitor and measure events that occur at the CPU …
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …
execution on underlying hardware by revealing information about timing and access …
WHISPER: A tool for run-time detection of side-channel attacks
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …
Hardware performance counter-based fine-grained malware detection
Detection of malicious programs using hardware-based features has gained prominence
recently. The tamper-resistant hardware metrics prove to be a better security feature than the …
recently. The tamper-resistant hardware metrics prove to be a better security feature than the …
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
This paper presents a run-time detection mechanism for access-driven cache-based Side-
Channel Attacks (CSCAs) on Intel's× 86 architecture. We demonstrate the detection …
Channel Attacks (CSCAs) on Intel's× 86 architecture. We demonstrate the detection …
Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks
Microarchitectural Side-Channel Attacks (SCAs) have posed serious threats to the security
of modern computing systems. Such attacks exploit side-channel vulnerabilities stemming …
of modern computing systems. Such attacks exploit side-channel vulnerabilities stemming …
Real time detection of spectre and meltdown attacks using machine learning
BA Ahmad - arxiv preprint arxiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking
confidential information to other processes through side-channel attacks. These …
confidential information to other processes through side-channel attacks. These …
Machine learning for security: The case of side-channel attack detection at run-time
This paper presents experimental evaluation and comparative analysis on the use of various
Machine Learning (ML) models for detecting Cache-based Side Channel Attacks (CSCAs) …
Machine Learning (ML) models for detecting Cache-based Side Channel Attacks (CSCAs) …
Meet the Sherlock Holmes' of side channel leakage: A survey of cache SCA detection techniques
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since,
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …
Deep learning based detection for multiple cache side-channel attacks
A cache side-channel attack retrieves victim's sensitive information from a system by
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …