Search Results - "Kopf, Boris"
-
1
Revizor: Testing Black-Box CPUs Against Speculation Contracts
Published in IEEE MICRO (01-07-2023)“…Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These…”
Get full text
Journal Article -
2
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to…”
Get full text
Conference Proceeding -
3
On the Incomparability of Cache Algorithms in Terms of Timing Leakage
Published in Logical methods in computer science (01-01-2019)“…Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensable for performance, caches pose a…”
Get full text
Journal Article -
4
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing…”
Get full text
Conference Proceeding -
5
Information-Theoretic Bounds for Differentially Private Mechanisms
Published in 2011 IEEE 24th Computer Security Foundations Symposium (01-06-2011)“…There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data…”
Get full text
Conference Proceeding -
6
Theory and Practice of Finding Eviction Sets
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01-05-2019)“…Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups of virtual addresses that map to the…”
Get full text
Conference Proceeding -
7
Hardware-Software Contracts for Secure Speculation
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. Intuitively, more defensive mechanisms are less…”
Get full text
Conference Proceeding -
8
Rational Protection against Timing Attacks
Published in 2015 IEEE 28th Computer Security Foundations Symposium (04-09-2015)“…Timing attacks can effectively recover keys from cryptosystems. While they can be defeated using constant-time implementations, this defensive approach comes…”
Get full text
Conference Proceeding -
9
Spectector: Principled Detection of Speculative Information Flows
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01-05-2020)“…Since the advent of Spectre, a number of counter-measures have been proposed and deployed. Rigorously reasoning about their effectiveness, however, requires a…”
Get full text
Conference Proceeding -
10
Automatic Discovery and Quantification of Information Leaks
Published in 2009 30th IEEE Symposium on Security and Privacy (01-05-2009)“…Information-flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. We present the first…”
Get full text
Conference Proceeding -
11
Approximation and Randomization for Quantitative Information-Flow Analysis
Published in 2010 23rd IEEE Computer Security Foundations Symposium (01-07-2010)“…Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is…”
Get full text
Conference Proceeding -
12
A Provably Secure and Efficient Countermeasure against Timing Attacks
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01-07-2009)“…We show that the amount of information about the key that an unknown-message attacker can extract from a deterministic side-channel is bounded from above by…”
Get full text
Conference Proceeding -
13
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
Published in 2010 23rd IEEE Computer Security Foundations Symposium (01-07-2010)“…We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding,…”
Get full text
Conference Proceeding -
14
Timing Leaks and Coarse-Grained Clocks
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01-06-2019)“…Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed…”
Get full text
Conference Proceeding -
15
On Aggregation of Information in Timing Attacks
Published in 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (01-06-2019)“…A key question for characterising a system's vulnerability against timing attacks is whether or not it allows an adversary to aggregate information about a…”
Get full text
Conference Proceeding -
16
Maatphor: Automated Variant Analysis for Prompt Injection Attacks
Published 12-12-2023“…Prompt injection has emerged as a serious security threat to large language models (LLMs). At present, the current best-practice for defending against…”
Get full text
Journal Article -
17
Transformational typing and unification for automatically correcting insecure programs
Published in International journal of information security (01-03-2007)“…Before starting a rigorous security analysis of a given software system, the most likely outcome is often already clear, namely that the system is not entirely…”
Get full text
Journal Article -
18
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
Published 18-01-2023“…Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to…”
Get full text
Journal Article -
19
Closed-Form Bounds for DP-SGD against Record-level Inference
Published 22-02-2024“…Machine learning models trained with differentially-private (DP) algorithms such as DP-SGD enjoy resilience against a wide range of privacy attacks. Although…”
Get full text
Journal Article -
20
Loophole: Timing Attacks on Shared Event Loops in Chrome
Published 22-02-2017“…Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly gaining importance for server-side and…”
Get full text
Journal Article