Skip to main content

Showing 1–4 of 4 results for author: Briongos, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.03002  [pdf, other

    cs.CR

    No Forking Way: Detecting Cloning Attacks on Intel SGX Applications

    Authors: Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde

    Abstract: Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the application to a previous state, or by cloning the application and by partitioning its inputs across the cloned instances. Current solutions to forking attacks require Trusted Third Parties (TTP) that are hard to find in real-world deployments. In the absence of a TTP, many TEE applications rely on monotonic… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 26 pages, 26 figures, 5 tables

  2. arXiv:2008.12188  [pdf, ps, other

    cs.CR

    CACHE SNIPER : Accurate timing control of cache evictions

    Authors: Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José M. Moya

    Abstract: Microarchitectural side channel attacks have been very prominent in security research over the last few years. Caches have been an outstanding covert channel, as they provide high resolution and generic cross-core leakage even with simple user-mode code execution privileges. To prevent these generic cross-core attacks, all major cryptographic libraries now provide countermeasures to hinder key ext… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

  3. arXiv:1904.06278  [pdf, ps, other

    cs.CR

    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks

    Authors: Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth

    Abstract: Caches have become the prime method for unintended information extraction across logical isolation boundaries. Even Spectre and Meltdown rely on the cache side channel, as it provides great resolution and is widely available on all major CPU platforms. As a consequence, several methods to stop cache attacks by detecting them have been proposed. Detection is strongly aided by the fact that observin… ▽ More

    Submitted 12 April, 2019; originally announced April 2019.

  4. arXiv:1709.01795  [pdf, other

    cs.CR

    CacheShield: Protecting Legacy Processes Against Cache Attacks

    Authors: Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth

    Abstract: Cache attacks pose a threat to any code whose execution flow or memory accesses depend on sensitive information. Especially in public clouds, where caches are shared across several tenants, cache attacks remain an unsolved problem. Cache attacks rely on evictions by the spy process, which alter the execution behavior of the victim process. We show that hardware performance events of cryptographic… ▽ More

    Submitted 6 September, 2017; originally announced September 2017.