Filters








118 Hits in 2.8 sec

SecCMP

Li Yang, Lu Peng, Balachandran Ramadass
2008 International Journal of Information Security and Privacy  
., encryption key) is divided into multiple shares and distributed among multiple cores instead of being kept a single copy in one core that is sensitive to exposure.  ...  Matching the nature of multi-core systems, a distributed threshold secret sharing scheme is employed to protect critical secrets.  ...  Failure of master private key reconstruction will result in a denial of service (DoS) attack.  ... 
doi:10.4018/jisp.2008100103 fatcat:5usdvkenm5blxfqlbngl7meth4

Memory and Cache Contention Denial-of-Service Attack in Mobile Edge Devices

Won Cho, Joonho Kong
2021 Applied Sciences  
In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure.  ...  By analyzing L1 data cache miss request patterns, we effectively detect the malicious program for the memory and cache contention denial-of-service attack.  ...  In this paper, we introduce a memory and cache contention denial-of-service attack that causes a denial-of-service in normal programs.  ... 
doi:10.3390/app11052385 fatcat:axhpjgs33nfejpvvtsl3ilrtra

Architectural support of multiple hypervisors over single platform for enhancing cloud computing security

Weidong Shi, JongHyuk Lee, Taeweon Suh, Dong Hyuk Woo, Xinwen Zhang
2012 Proceedings of the 9th conference on Computing Frontiers - CF '12  
Towards defending against resource exhaustion attacks, Mul-tiHype further implements a new cache eviction policy and memory management scheme for preventing resource monopolization on shared cache, and  ...  defending against denial of resource exploits on physical memory resource launched from malicious virtual machines on shared platform.  ...  policy for preventing cache exhaustion attacks, and efficient memory management approach for defending against denial of resource attacks on physical memory in multi-tenancy cloud environment.  ... 
doi:10.1145/2212908.2212920 dblp:conf/cf/ShiLSWZ12 fatcat:rci47aksovdabf36x2ekaa2n34

Virtual private caches

Kyle J. Nesbit, James Laudon, James E. Smith
2007 Proceedings of the 34th annual international symposium on Computer architecture - ISCA '07  
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems.  ...  Virtual Private Caches (VPCs) are an important element of VPMs, and VPC hardware consists of two major components: the VPC Arbiters, which manage shared resource bandwidth, and the VPC Capacity Manager  ...  Or, as in the case of a denial of service attack, it may not be inadvertent. ,  1 = .5, and  1 = 1 ; leftover bandwidth is allocated equally amongst the background Stores benchmarks.  ... 
doi:10.1145/1250662.1250671 dblp:conf/isca/NesbitLS07 fatcat:ripgdansa5h5hk5quldf2azoey

Virtual private caches

Kyle J. Nesbit, James Laudon, James E. Smith
2007 SIGARCH Computer Architecture News  
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems.  ...  Virtual Private Caches (VPCs) are an important element of VPMs, and VPC hardware consists of two major components: the VPC Arbiters, which manage shared resource bandwidth, and the VPC Capacity Manager  ...  Or, as in the case of a denial of service attack, it may not be inadvertent. ,  1 = .5, and  1 = 1 ; leftover bandwidth is allocated equally amongst the background Stores benchmarks.  ... 
doi:10.1145/1273440.1250671 fatcat:xyiqgy2sorb77ckf2pz4c7oiz4

Topology-Aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors [chapter]

Boris Grot, Stephen W. Keckler, Onur Mutlu
2011 Lecture Notes in Computer Science  
With increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future.  ...  As multiple, potentially malevolent, users begin to share virtualized resources of a single chip, CMP-level quality-of-service (QOS) support becomes necessary to provide performance isolation, service  ...  Acknowledgement We wish to thank Naveen Muralimanohar for his help with CACTI, and Emmett Witchel for clarifying the mechanics of inter-process communication.  ... 
doi:10.1007/978-3-642-24322-6_28 fatcat:7qjdeo7torehvmyl4xvl2eim3e

Efficient Timing Channel Protection for On-Chip Networks

Yao Wang, G. Edward Suh
2012 2012 IEEE/ACM Sixth International Symposium on Networks-on-Chip  
In general, such shared resources imply that applications can affect each other's timing characteristics through interference in shared resources.  ...  On-chip network is often dynamically shared among applications that are concurrently running on a chipmultiprocessor (CMP).  ...  To prevent the low-security traffic to cause a denial-of-service (DoS) attack, we throttle the low-security traffic based on conditions that do not depend on the highsecurity traffic.  ... 
doi:10.1109/nocs.2012.24 dblp:conf/nocs/WangS12 fatcat:2keglrbfurfxfecawyduzq4z7q

Internet security attacks at the basic levels

Marco de Vivo, Gabriela O. de Vivo, Germinal Isern
1998 ACM SIGOPS Operating Systems Review  
, denial-of-service, and so on.  ...  In fact in some of its components, security was consciously traded for easiness in sharing.  ...  In a denial of service attack (D.O.S. attack), one user takes up so much of a shared resource that none of the resource is left for other users [25] .  ... 
doi:10.1145/506133.506136 fatcat:aqrulrynyjb7bffk4int4jglru

An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors

Weidong Shi, Hsien-Hsin S. Lee, Laura `Falk, Mrinmoy Ghosh
2006 SIGARCH Computer Architecture News  
INDRA represents the first effort to create remote attack immune, self-healing network services using the emerging multicore processors.  ...  By exploring the property of a tightly-coupled multicore system, INDRA pioneers several concepts.  ...  In some cases, service providers are blackmailed by the attackers to either satisfy to their demands or suffer a denial-of-service (DoS) attack [22] .  ... 
doi:10.1145/1150019.1136520 fatcat:2cgtp3yiincg3j3o3lyjazv7t4

Exploiting Process Variations to Secure Photonic NoC Architectures from Snooping Attacks [article]

Sai Vineel Reddy Chittamuru, Ishan G Thakkar, Sudeep Pasricha, Sairam Sri Vatsavai, Varun Bhat
2020 arXiv   pre-print
Unfortunately, a Hardware Trojan in a PNoC can manipulate the electrical driving circuit of its MRs to cause the MRs to snoop data from the neighboring wavelength channels in a shared photonic waveguide  ...  Evaluation results indicate that our framework can improve hardware security across various PNoC architectures with minimal overheads of up to 14.2% in average latency and of up to 14.6% in energy-delay-product  ...  In addition to data corruption and snooping attacks (illustrated in Fig. 3 ), malicious MRs in MWMR links can also cause Denial of Service (DoS) attacks as briefly described in Section III.B.  ... 
arXiv:2007.10454v1 fatcat:4oz7ymoxgfh4fjku5s675dmgnm

I2SEMS: Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems

Manhee Lee, Minseon Ahn, Eun Jung Kim
2007 Parallel Architecture and Compilation Techniques (PACT), Proceedings of the International Conference on  
In this paper, we present a fast and efficient method for providing secure memory and cache-to-cache communications in shared memory multiprocessor systems that are becoming enormously popular in designing  ...  Since our scheme is independent of underlying interconnects and cache coherence protocols, we refer to it as Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems (I 2 SEMS).  ...  Next, we would like to expand our research to much larger multiprocessor systems with distributed shared memory (DSM) and to new multiprocessor architectures such as Chip Multiprocessor (CMP) systems.  ... 
doi:10.1109/pact.2007.4336203 fatcat:62pacrxg2feeheqlzn54enu2di

Kilo-NOC

Boris Grot, Joel Hestness, Stephen W. Keckler, Onur Mutlu
2011 SIGARCH Computer Architecture News  
Today's chip-level multiprocessors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated  ...  quality-of-service (QOS) guarantees.  ...  attack in a multi-core CMP.  ... 
doi:10.1145/2024723.2000112 fatcat:vidtu6m7evc43lviuuassnggyq

Kilo-NOC

Boris Grot, Joel Hestness, Stephen W. Keckler, Onur Mutlu
2011 Proceeding of the 38th annual international symposium on Computer architecture - ISCA '11  
Today's chip-level multiprocessors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated  ...  quality-of-service (QOS) guarantees.  ...  attack in a multi-core CMP.  ... 
doi:10.1145/2000064.2000112 dblp:conf/isca/GrotHKM11 fatcat:3vveq3tdcjfxdgtfj553kjgq5i

The Secure Machine: Efficient Secure Execution On Untrusted Platforms [article]

Ofir Shwartz, Yitzhak Birk
2018 arXiv   pre-print
To enable secure data sharing in shared memory environments, we developed Secure Distributed Shared Memory (SDSM), an efficient (time and memory) algorithm for allowing thousands of compute nodes to share  ...  SeM uses a small amount of in-chip additional hardware that monitors key communication channels inside the CPU chip, and only acts when required.  ...  This is essentially a denial of service attack, since the program expects a new thread to run, but it will never do so.  ... 
arXiv:1803.03951v1 fatcat:judqg442wvekdbevambchu3o6i

Domain Name System Security and Privacy: A Contemporary Survey [article]

Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen
2020 arXiv   pre-print
In order to comprehensively understand the root causes of the vulnerabilities of DNS, it is mandatory to review the various activities in the research community on DNS landscape.  ...  Furthermore, we looked into the DNSthreat landscape from the viewpoint of the involved entities in the DNS infrastructure in an attempt to point out more vulnerable entities in the system.  ...  In addition, Rossow [103] has investigated Distributed Reflective Denial-of-Service (DRDoS) attacks through revisiting well-known UDP-based protocols, including network services, online games, file sharing  ... 
arXiv:2006.15277v1 fatcat:loknouehirdhvdgztkevi27vse
« Previous Showing results 1 — 15 out of 118 results