Skip to main content

Showing 1–4 of 4 results for author: Irazoqui, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:1709.01795  [pdf, other

    cs.CR

    CacheShield: Protecting Legacy Processes Against Cache Attacks

    Authors: Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth

    Abstract: Cache attacks pose a threat to any code whose execution flow or memory accesses depend on sensitive information. Especially in public clouds, where caches are shared across several tenants, cache attacks remain an unsolved problem. Cache attacks rely on evictions by the spy process, which alter the execution behavior of the victim process. We show that hardware performance events of cryptographic… ▽ More

    Submitted 6 September, 2017; originally announced September 2017.

  2. arXiv:1709.01552  [pdf, other

    cs.CR

    Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries

    Authors: Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun Kanuparthi, Thomas Eisenbarth, Berk Sunar

    Abstract: This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers vulnerabilities that are hard to find with other techniques, observed as exploitable leakage. The methodology works by identifying secret dependent memory and introducing forced evictions inside potentially vulnerable code to obtain cache traces that are… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

  3. arXiv:1703.09763  [pdf, other

    cs.CR

    AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

    Authors: Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth

    Abstract: Attacks on the microarchitecture of modern processors have become a practical threat to security and privacy in desktop and cloud computing. Recently, cache attacks have successfully been demonstrated on ARM based mobile devices, suggesting they are as vulnerable as their desktop or server counterparts. In this work, we show that previous literature might have left an overly pessimistic conclusion… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

  4. arXiv:1703.06986  [pdf, other

    cs.CR

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Authors: Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth

    Abstract: In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are mal… ▽ More

    Submitted 20 August, 2017; v1 submitted 20 March, 2017; originally announced March 2017.

    Comments: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17)