Skip to main content

Showing 1–10 of 10 results for author: Nemati, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.09770  [pdf, other

    cs.CR

    Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization

    Authors: Tiziano Marinaro, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati

    Abstract: Since the advent of Spectre attacks, researchers and practitioners have developed a range of hardware and software measures to counter transient execution attacks. A prime example of such mitigation is speculative load hardening in LLVM, which protects against leaks by tracking the speculation state and masking values during misspeculation. LLVM relies on static analysis to harden programs using s… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: The paper will appear in ACM AsiaCCS 2024

  2. arXiv:2309.05174  [pdf, other

    cs.CR cs.AR

    Serberus: Protecting Cryptographic Code from Spectres at Compile-Time

    Authors: Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel

    Abstract: We present Serberus, the first comprehensive mitigation for hardening constant-time (CT) code against Spectre attacks (involving the PHT, BTB, RSB, STL and/or PSF speculation primitives) on existing hardware. Serberus is based on three insights. First, some hardware control-flow integrity (CFI) protections restrict transient control-flow to the extent that it may be comprehensively considered by s… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: Authors' version; to appear in the Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024

  3. arXiv:2308.14450  [pdf, other

    cs.CR

    CryptoBap: A Binary Analysis Platform for Cryptographic Protocols

    Authors: Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati

    Abstract: We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC-V) machine code of cryptographic protocols. We achieve this by first transpiling the binary of protocols into an intermediate representation and then performing a crypto-aware symbolic execution to automatically extract a model of the protocol that represents all its execution paths. Our symbolic e… ▽ More

    Submitted 18 September, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

  4. Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels

    Authors: Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow

    Abstract: The complexity of modern processor architectures has given rise to sophisticated interactions among their components. Such interactions may result in potential attack vectors in terms of side channels, possibly available to user-land exploits to leak secret data. Exploitation and countering of such side channels require a detailed understanding of the target component. However, such detailed infor… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  5. arXiv:2112.10511  [pdf, ps, other

    cs.CR cs.AR

    Relational Models of Microarchitectures for Formal Security Analyses

    Authors: Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel

    Abstract: There is a growing need for hardware-software contracts which precisely define the implications of microarchitecture on software security-i.e., security contracts. It is our view that such contracts should explicitly account for microarchitecture-level implementation details that underpin hardware leakage, thereby establishing a direct correspondence between a contract and the microarchitecture it… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

  6. arXiv:2106.03470  [pdf, other

    cs.CR

    Osiris: Automated Discovery of Microarchitectural Side Channels

    Authors: Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow

    Abstract: In the last years, a series of side channels have been discovered on CPUs. These side channels have been used in powerful attacks, e.g., on cryptographic implementations, or as building blocks in transient-execution attacks such as Spectre or Meltdown. However, in many cases, discovering side channels is still a tedious manual process. In this paper, we present Osiris, a fuzzing-based framework… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

    Comments: Will be published at USENIX Security'21

  7. arXiv:2007.06865  [pdf, ps, other

    cs.CR

    Speculative Leakage in ARM Cortex-A53

    Authors: Hamed Nemati, Roberto Guanciale, Pablo Buiras, Andreas Lindner

    Abstract: The recent Spectre attacks have demonstrated that modern microarchitectural optimizations can make software insecure. These attacks use features like pipelining, out-of-order and speculation to extract information about the memory contents of a process via side-channels. In this paper we demonstrate that Cortex-A53 is affected by speculative leakage even if the microarchitecture does not support o… ▽ More

    Submitted 17 July, 2020; v1 submitted 14 July, 2020; originally announced July 2020.

  8. arXiv:2005.05254  [pdf, other

    cs.CR

    Validation of Abstract Side-Channel Models for Computer Architectures

    Authors: Hamed Nemati, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Swen Jacobs

    Abstract: Observational models make tractable the analysis of information flow properties by providing an abstraction of side channels. We introduce a methodology and a tool, Scam-V, to validate observational models for modern computer architectures. We combine symbolic execution, relational analysis, and different program generation techniques to generate experiments and validate the models. An experiment… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  9. arXiv:2005.02605  [pdf, other

    cs.CR

    Secure System Virtualization: End-to-End Verification of Memory Isolation

    Authors: Hamed Nemati

    Abstract: Over the last years, security kernels have played a promising role in resha** the landscape of platform security on today's ubiquitous embedded devices. Security kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms. They reduce the software portion of the system's trusted computing base to a thin layer, which enforces isolation between low… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  10. arXiv:1210.3494  [pdf, ps, other

    cs.OH

    Varactor-Based Dynamic Load Modulation of High Power Amplifiers

    Authors: Ali Soltani Tehrani, Hossein Mashad Nemati, Haiying Cao, Thomas Eriksson, Christian Fager

    Abstract: In this work, dynamic load modulation of high power amplifiers using a varactor-based tunable matching network is presented. The feasibility of dynamic tuning and efficiency enhancement of this technique is demonstrated using a modular design approach for two existing high efficiency power amplifiers (PA), a 7-W class-E, and a 10-W class-J power amplifier PA at 1 GHz. For this purpose and for each… ▽ More

    Submitted 24 October, 2012; v1 submitted 12 October, 2012; originally announced October 2012.