Skip to main content

Showing 1–5 of 5 results for author: Hetzelt, F

.
  1. arXiv:2209.02638  [pdf, other

    cs.PL cs.SE

    DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases

    Authors: Min-Yih Hsu, Felicitas Hetzelt, Michael Franz

    Abstract: Context- and flow-sensitive value-flow information is an important building block for many static analysis tools. Unfortunately, current approaches to compute value-flows do not scale to large codebases, due to high memory and runtime requirements. This paper proposes a new scalable approach to compute value-flows via graph reachability. To this end, we develop a new graph structure as an extensio… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  2. arXiv:2201.04804  [pdf, other

    cs.PL

    A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing

    Authors: Min-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz

    Abstract: Estimating instruction-level throughput is critical for many applications: multimedia, low-latency networking, medical, automotive, avionic, and industrial control systems all rely on tightly calculable and accurate timing bounds of their software. Unfortunately, how long a program may run - or if it may indeed stop at all - cannot be answered in the general case. This is why state-of-the-art thro… ▽ More

    Submitted 16 May, 2023; v1 submitted 13 January, 2022; originally announced January 2022.

  3. arXiv:2109.10660  [pdf, other

    cs.CR

    VIA: Analyzing Device Interfaces of Protected Virtual Machines

    Authors: Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert

    Abstract: Both AMD and Intel have presented technologies for confidential computing in cloud environments. The proposed solutions - AMD SEV (-ES, -SNP) and Intel TDX - protect Virtual Machines (VMs) against attacks from higher privileged layers through memory encryption and integrity protection. This model of computation draws a new trust boundary between virtual devices and the VM, which in so far lacks th… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  4. arXiv:1612.01119  [pdf, other

    cs.CR

    Security Analysis of Encrypted Virtual Machines

    Authors: Felicitas Hetzelt, Robert Buhren

    Abstract: Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that allows for sharing of hardware resources among different customers. The controlling software component, called hypervisor, provides a virtualized view… ▽ More

    Submitted 25 July, 2017; v1 submitted 4 December, 2016; originally announced December 2016.

  5. arXiv:1610.08717  [pdf, other

    cs.NI

    Reins to the Cloud: Compromising Cloud Systems via the Data Plane

    Authors: Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid

    Abstract: Virtual switches have become popular among cloud operating systems to interconnect virtual machines in a more flexible manner. However, this paper demonstrates that virtual switches introduce new attack surfaces in cloud setups, whose effects can be disastrous. Our analysis shows that these vulnerabilities are caused by: (1) inappropriate security assumptions (privileged virtual switch execution i… ▽ More

    Submitted 10 February, 2017; v1 submitted 27 October, 2016; originally announced October 2016.