Skip to main content

Showing 1–5 of 5 results for author: Gens, D

.
  1. arXiv:2201.04804  [pdf, other

    cs.PL

    A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing

    Authors: Min-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz

    Abstract: Estimating instruction-level throughput is critical for many applications: multimedia, low-latency networking, medical, automotive, avionic, and industrial control systems all rely on tightly calculable and accurate timing bounds of their software. Unfortunately, how long a program may run - or if it may indeed stop at all - cannot be answered in the general case. This is why state-of-the-art thro… ▽ More

    Submitted 16 May, 2023; v1 submitted 13 January, 2022; originally announced January 2022.

  2. arXiv:1912.04870  [pdf

    cs.CR

    V0LTpwn: Attacking x86 Processor Integrity from Software

    Authors: Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi

    Abstract: Fault-injection attacks have been proven in the past to be a reliable way of bypassing hardware-based security measures, such as cryptographic hashes, privilege and access permission enforcement, and trusted execution environments. However, traditional fault-injection attacks require physical presence, and hence, were often considered out of scope in many real-world adversary settings. In this p… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

  3. arXiv:1812.00197  [pdf, other

    cs.CR

    When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

    Authors: Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran

    Abstract: In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect hardware vulnerabilities during the design phase. We show that a protection gap currently exists in practice that leaves chip designs vulnerable to software-based attacks. In particular, existing verification approaches fail to detect specific cl… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.

  4. arXiv:1703.02698  [pdf, other

    cs.CR

    Execution Integrity with In-Place Encryption

    Authors: Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin

    Abstract: Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

  5. arXiv:1611.08396  [pdf, other

    cs.CR

    CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks

    Authors: Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi

    Abstract: Rowhammer is a hardware bug that can be exploited to implement privilege escalation and remote code execution attacks. Previous proposals on rowhammer mitigation either require hardware changes or follow heuristic-based approaches (based on CPU performance counters). To date, there exists no instant protection against rowhammer attacks on legacy systems. In this paper, we present the design and… ▽ More

    Submitted 7 December, 2016; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: -- Clarifications based on intial feedback -- p7: clarified formula p10: included rest of pts/memory (cachebench/ramspeed) in Tab III p12: include discussion on how single-sided rowhammer attacks are mitigated and benchmark selection p13: updated related work p14: updated acknowledgment