Skip to main content

Showing 1–4 of 4 results for author: Ojha, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08795  [pdf, other

    cs.CR cs.AR

    RollingCache: Using Runtime Behavior to Defend Against Cache Side Channel Attacks

    Authors: Divya Ojha, Sandhya Dwarkadas

    Abstract: Shared caches are vulnerable to side channel attacks through contention in cache sets. Besides being a simple source of information leak, these side channels form useful gadgets for more sophisticated attacks that compromise the security of shared systems. The fundamental design aspect that contention attacks exploit is the deterministic nature of the set of addresses contending for a cache set.… ▽ More

    Submitted 26 August, 2024; v1 submitted 16 August, 2024; originally announced August 2024.

  2. Timing Cache Accesses to Eliminate Side Channels in Shared Software

    Authors: Divya Ojha, Sandhya Dwarkadas

    Abstract: Timing side channels have been used to extract cryptographic keys and sensitive documents, even from trusted enclaves. In this paper, we focus on cache side channels created by access to shared code or data in the memory hierarchy. This vulnerability is exploited by several known attacks, e.g, evict+reload for recovering an RSA key and Spectre variants for data leaked due to speculative accesses.… ▽ More

    Submitted 16 December, 2021; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2021

    Report number: Technical Report: UR CSD / 1009

  3. arXiv:1903.10651  [pdf, other

    cs.CR

    Restricting Control Flow During Speculative Execution with Venkman

    Authors: Zhuojia Shen, Jie Zhou, Divya Ojha, John Criswell

    Abstract: Side-channel attacks such as Spectre that utilize speculative execution to steal application secrets pose a significant threat to modern computing systems. While program transformations can mitigate some Spectre attacks, more advanced attacks can divert control flow speculatively to bypass these protective instructions, rendering existing defenses useless. In this paper, we present Venkman: a sy… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

  4. arXiv:0912.1832  [pdf

    cs.DS cs.CG

    Lexicographic Multi-objective Geometric Programming Problems

    Authors: Dr. A. K. Ojha, K. K. Biswal

    Abstract: A Geometric programming (GP) is a type of mathematical problem characterized by objective and constraint functions that have a special form. Many methods have been developed to solve large scale engineering design GP problems. In this paper GP technique has been used to solve multi-objective GP problem as a vector optimization problem. The duality theory for lexicographic geometric programming h… ▽ More

    Submitted 9 December, 2009; originally announced December 2009.

    Comments: International Journal of Computer Science Issues, IJCSI Volume 6, Issue 2, pp20-24, November 2009

    Journal ref: Dr.A. K. Ojha and K. K. Biswal, "Lexicographic Multi-objective Geometric Programming Problems", International Journal of Computer Science Issues, IJCSI, Volume 6, Issue 2, pp20-24, November 2009