نتایج جستجو برای: flush reload attack

تعداد نتایج: 83375  

2015
Xin Li Anting Liu

Cache-based side-channel is an application-specific behavior of cache memory which will possibly leak secret information. In cloud computing services, providers share physical resources, i.e. infrastructures, to support multi-tenancy of cloud platform, which will achieve high quality of cost efficiency, availability, and on-demand scaling. However, by sharing the infrastructure, sensitive data ...

Journal: :PoPETs 2015
Gorka Irazoqui Apecechea Mehmet Sinan Inci Thomas Eisenbarth Berk Sunar

Software updates and security patches have become a standard method to fix known and recently discovered security vulnerabilities in deployed software. In server applications, outdated cryptographic libraries allow adversaries to exploit weaknesses and launch attacks with significant security results. The proposed technique exploits leakages at the hardware level to first, determine if a specif...

2015
Xin Li Anting Liu

Cache-based side-channel is a behavior of cache memory which will possibly leak secret information. In cloud computing services, providers share physical resources, i.e. infrastructures, to support multi-tenancy of cloud platform, which will achieve high quality of cost efficiency, availability, and on-demand scaling. However, by sharing the infrastructure, sensitive data from individual users ...

2017
Maria Mushtaq Vianney Lapotre Guy Gogniat M. Asim Mukhtar Muhammad Khurram Bhatti

Side channels and covert channels can give untrusted applications access to the trusted and sensitive data in order to retrieve private information.. In this poster, we present a countermeasure called the Smartflush against cache-based Side Channel Attacks (SCAs). The Smartflush is a quick-patch countermeasure proposed to counter timing attacks that exploit inclusive caches in Intel’s x86 archi...

2016
Mehmet Sinan Inci Berk Gülmezoglu Thomas Eisenbarth Berk Sunar

In this work we focus on the problem of co-location as a first step of conducting Cross-VM attacks such as Prime and Probe or Flush+Reload in commercial clouds. We demonstrate and compare three co-location detection methods namely, cooperative Last-Level Cache (LLC) covert channel, software profiling on the LLC and memory bus locking. We conduct our experiments on three commercial clouds, Amazo...

2000
Mark C. Davis Joseph W. Pahle John Terry White Laurie A. Marshall Michael J. Mashburn

NASA Dryden Flight Research Center has developed a flush airdata sensing (FADS) system on a sharp-nosed, wedge-shaped vehicle. This paper details the design and calibration of a real-time angle-ofattack estimation scheme developed to meet the onboard airdata measurement requirements for a research vehicle equipped with a supersonic-combustion ramjet engine. The FADS system has been designed to ...

2006
MIN DAI YUE KUEN KWOK

The reload provision in an employee stock option entitles its holder to receive one new (reload) option from the employer for each share tendered as payment of strike upon the exercise of the stock option. The number of reloads allowed can be finite or infinite. The shout feature in a call option allows its holder to reset the option’s strike price to the prevailing stock price upon shouting. W...

2000
Thomas Hemmer Steve Matsunaga

Abstract: A reload option awards a new option for every share tendered to exercise an existing option. We use a sample of 242 firms that adopted reload provisions to investigate claims that firms use reload options to encourage early exercise and increase share ownership (incentive alignment) against the competing claim that reloads transfer wealth from shareholders to managers. We find that CE...

2012
Didem Gözüpek Mordechai Shalom Ariella Voloshin Shmuel Zaks

The reload cost concept refers to the cost that occurs at a vertex along a path on an edge-colored graph when it traverses an internal vertex between two edges of different colors. The reload cost depends only on the colors of the traversed edges. Previous work on reload costs focuses on the problem of finding a spanning tree that minimizes the total reload cost from a source vertex to all othe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید