Understanding contention-based channels and using them for defense


Microarchitectural resources such as caches and predictors can be used to leak information across security domains. Significant prior work has demonstrated attacks and defenses for specific types of such microarchitectural side and covert channels. In this paper, we introduce a general mathematical study of microarchitectural channels using information… (More)
DOI: 10.1109/HPCA.2015.7056069


12 Figures and Tables


Citations per Year

Citation Velocity: 30

Averaging 30 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics