Skip to main content

Showing 1–7 of 7 results for author: Vila, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.03841  [pdf, ps, other

    cs.CR

    Hardware-Software Contracts for Secure Speculation

    Authors: Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila

    Abstract: Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. Intuitively, more defensive mechanisms are less efficient but can securely execute a larger class of programs, while more permissive mechanisms may offer more performance but require more defensive programming. Unfortunately, there are no hardware-software contracts that would turn this… ▽ More

    Submitted 1 October, 2020; v1 submitted 6 June, 2020; originally announced June 2020.

    Comments: Camera ready version that will appear in the proceedings of the 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021). A technical report containing a full formalization and proofs of all results is available at arXiv:2006.03841v2

  2. arXiv:2005.13853  [pdf, other

    cs.CR

    Flushgeist: Cache Leaks from Beyond the Flush

    Authors: Pepe Vila, Andreas Abel, Marco Guarnieri, Boris Köpf, Jan Reineke

    Abstract: Flushing the cache, using instructions like clflush and wbinvd, is commonly proposed as a countermeasure against access-based cache attacks. In this report, we show that several Intel caches, specifically the L1 caches in some pre-Skylake processors and the L2 caches in some post-Broadwell processors, leak information even after being flushed through clflush and wbinvd instructions. That is, secur… ▽ More

    Submitted 13 September, 2020; v1 submitted 28 May, 2020; originally announced May 2020.

    Comments: 6 pages, 4 figures

  3. arXiv:1912.09770  [pdf, other

    cs.PL cs.FL

    CacheQuery: Learning Replacement Policies from Hardware Caches

    Authors: Pepe Vila, Pierre Ganty, Marco Guarnieri, Boris Köpf

    Abstract: We show how to infer deterministic cache replacement policies using off-the-shelf automata learning and program synthesis techniques. For this, we construct and chain two abstractions that expose the cache replacement policy of any set in the cache hierarchy as a membership oracle to the learning algorithm, based on timing measurements on a silicon CPU. Our experiments demonstrate an advantage in… ▽ More

    Submitted 26 May, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: 17 pages, 5 tables, 5 figures

  4. arXiv:1810.01497  [pdf, ps, other

    cs.CR

    Theory and Practice of Finding Eviction Sets

    Authors: Pepe Vila, Boris Köpf, José Francisco Morales

    Abstract: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups of virtual addresses that map to the same cache set. This capability has become a decisive primitive for cache side-channel, rowhammer, and speculative execution attacks. Despite their importance, algorithms for finding small eviction sets have not been systematically studied in t… ▽ More

    Submitted 10 December, 2018; v1 submitted 2 October, 2018; originally announced October 2018.

    Comments: To appear at IEEE Symposium on Security and Privacy, 2019

  5. arXiv:1712.02609  [pdf, other

    stat.ML cs.CV cs.LG

    Solving internal covariate shift in deep learning with linked neurons

    Authors: Carles Roger Riera Molina, Oriol Pujol Vila

    Abstract: This work proposes a novel solution to the problem of internal covariate shift and dying neurons using the concept of linked neurons. We define the neuron linkage in terms of two constraints: first, all neuron activations in the linkage must have the same operating point. That is to say, all of them share input weights. Secondly, a set of neurons is linked if and only if there is at least one memb… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

    Comments: Submitted to CVPR 2018. Code available at https://github.com/blauigris/linked_neurons

  6. arXiv:1702.06764  [pdf, ps, other

    cs.CR

    Loophole: Timing Attacks on Shared Event Loops in Chrome

    Authors: Pepe Vila, Boris Köpf

    Abstract: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly gaining importance for server-side and network programming. Central components of EDP are {\em event loops}, which act as FIFO queues that are used by processes to store and dispatch messages received from other processes. In this paper we demonstrate that shared event loops are… ▽ More

    Submitted 28 June, 2017; v1 submitted 22 February, 2017; originally announced February 2017.

    Comments: Original publication in the Proceedings of the 26th Annual USENIX Security Symposium (USENIX Security 2017). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/vila

  7. Expectation-Maximization Gaussian-Mixture Approximate Message Passing

    Authors: Jeremy P. Vila, Philip Schniter

    Abstract: When recovering a sparse signal from noisy compressive linear measurements, the distribution of the signal's non-zero coefficients can have a profound effect on recovery mean-squared error (MSE). If this distribution was apriori known, then one could use computationally efficient approximate message passing (AMP) techniques for nearly minimum MSE (MMSE) recovery. In practice, though, the distribut… ▽ More

    Submitted 30 June, 2013; v1 submitted 12 July, 2012; originally announced July 2012.