Skip to main content

Showing 1–2 of 2 results for author: Nordholz, J

.
  1. arXiv:1806.01147  [pdf, other

    cs.OS

    Minimizing Event-Handling Latencies in Secure Virtual Machines

    Authors: Janis Danisevskis, Michael Peter, Jan Nordholz

    Abstract: Virtualization, after having found widespread adoption in the server and desktop arena, is poised to change the architecture of embedded systems as well. The benefits afforded by virtualization - enhanced isolation, manageability, flexibility, and security - could be instrumental for developers of embedded systems as an answer to the rampant increase in complexity. While mature desktop and serve… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

  2. arXiv:1612.03744  [pdf, ps, other

    cs.CR

    Fault Attacks on Encrypted General Purpose Compute Platforms

    Authors: Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter

    Abstract: Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. In response, several main-memory encryption schemes have been proposed to prevent such attacks. Also hardware vendors have acknowledged the threat and already announced respective hardware extensions. Intel's SGX and AMD's SME will provide means to encrypt parts of the… ▽ More

    Submitted 12 December, 2016; originally announced December 2016.