Understanding contention-based channels and using them for defense

Abstract

Microarchitectural resources such as caches and predictors can be used to leak information across security domains. Significant prior work has demonstrated attacks and defenses for specific types of such microarchitectural side and covert channels. In this paper, we introduce a general mathematical study of microarchitectural channels using information… (More)
DOI: 10.1109/HPCA.2015.7056069

Topics

12 Figures and Tables

Statistics

050100201520162017
Citations per Year

Citation Velocity: 30

Averaging 30 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics