Skip to main content

Showing 1–4 of 4 results for author: Malagón, P

Searching in archive cs. Search in all archives.
.
  1. Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications

    Authors: Román Cárdenas, Patricia Arroba, Roberto Blanco, Pedro Malagón, José L. Risco-Martín, José M. Moya

    Abstract: The Internet of Things is transforming our society by monitoring users and infrastructures' behavior to enable new services that will improve life quality and resource management. These applications require a vast amount of localized information to be processed in real-time so, the deployment of new fog computing infrastructures that bring computing closer to the data sources is a major concern. I… ▽ More

    Submitted 2 November, 2023; originally announced December 2023.

    Journal ref: Simulation Modelling Practice and Theory, 101, 2019

  2. arXiv:2008.12188  [pdf, ps, other

    cs.CR

    CACHE SNIPER : Accurate timing control of cache evictions

    Authors: Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José M. Moya

    Abstract: Microarchitectural side channel attacks have been very prominent in security research over the last few years. Caches have been an outstanding covert channel, as they provide high resolution and generic cross-core leakage even with simple user-mode code execution privileges. To prevent these generic cross-core attacks, all major cryptographic libraries now provide countermeasures to hinder key ext… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

  3. arXiv:1904.06278  [pdf, ps, other

    cs.CR

    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks

    Authors: Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth

    Abstract: Caches have become the prime method for unintended information extraction across logical isolation boundaries. Even Spectre and Meltdown rely on the cache side channel, as it provides great resolution and is widely available on all major CPU platforms. As a consequence, several methods to stop cache attacks by detecting them have been proposed. Detection is strongly aided by the fact that observin… ▽ More

    Submitted 12 April, 2019; originally announced April 2019.

  4. arXiv:1709.01795  [pdf, other

    cs.CR

    CacheShield: Protecting Legacy Processes Against Cache Attacks

    Authors: Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth

    Abstract: Cache attacks pose a threat to any code whose execution flow or memory accesses depend on sensitive information. Especially in public clouds, where caches are shared across several tenants, cache attacks remain an unsolved problem. Cache attacks rely on evictions by the spy process, which alter the execution behavior of the victim process. We show that hardware performance events of cryptographic… ▽ More

    Submitted 6 September, 2017; originally announced September 2017.