Skip to main content

Showing 1–5 of 5 results for author: Weiser, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.03395  [pdf, other

    cs.CR

    SERVAS! Secure Enclaves via RISC-V Authenticryption Shield

    Authors: Stefan Steinegger, David Schrammel, Samuel Weiser, Pascal Nasahl, Stefan Mangard

    Abstract: Isolation is a long-standing challenge of software security. Traditional privilege rings and virtual memory are more and more augmented with concepts such as capabilities, protection keys, and powerful enclaves. At the same time, we are evidencing an increased need for physical protection, shifting towards full memory encryption schemes. This results in a complex interplay of various security mech… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  2. arXiv:1902.03256  [pdf, ps, other

    cs.CR

    Practical Enclave Malware with Intel SGX

    Authors: Michael Schwarz, Samuel Weiser, Daniel Gruss

    Abstract: Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel's threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave m… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

  3. arXiv:1706.06381  [pdf, other

    cs.CR

    KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks

    Authors: Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard

    Abstract: Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously proposed countermeasures fail to prevent keystroke timing attacks as they do not protect keystroke processing among the entire software stack. We close… ▽ More

    Submitted 20 June, 2017; originally announced June 2017.

  4. arXiv:1702.08719  [pdf, other

    cs.CR

    Malware Guard Extension: Using SGX to Conceal Cache Attacks

    Authors: Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard

    Abstract: In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus the supplied operating system and hardware. Int… ▽ More

    Submitted 22 May, 2019; v1 submitted 28 February, 2017; originally announced February 2017.

    Comments: Extended version of DIMVA 2017 submission

  5. SGXIO: Generic Trusted I/O Path for Intel SGX

    Authors: Samuel Weiser, Mario Werner

    Abstract: Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SG… ▽ More

    Submitted 4 January, 2017; originally announced January 2017.

    Comments: To appear in CODASPY'16