Search For:

Displaying 1-6 out of 6 total
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security
Found in: IEEE Micro
By John Demme,Robert Martin,Adam Waksman,Simha Sethumadhavan
Issue Date:May 2013
pp. 68-77
User inputs tend to change the execution characteristics of applications including their interactions with cache, network, storage, and other systems. Many attacks have exploited the observable side effects of these execution characteristics to expose sens...
 
Silencing Hardware Backdoors
Found in: Security and Privacy, IEEE Symposium on
By Adam Waksman, Simha Sethumadhavan
Issue Date:May 2011
pp. 49-63
Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP provider. In this paper, we propose tec...
 
Tamper Evident Microprocessors
Found in: Security and Privacy, IEEE Symposium on
By Adam Waksman, Simha Sethumadhavan
Issue Date:May 2010
pp. 173-188
Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors are vulnerable to insider attacks that can catastrophically compromise security, integ...
 
FANCI: identification of stealthy malicious logic using boolean functional analysis
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Simha Sethumadhavan, Adam Waksman, Matthew Suozzo
Issue Date:November 2013
pp. 697-708
Hardware design today bears similarities to software design. Often vendors buy and integrate code acquired from third-party organizations into their designs, especially in embedded/system-on-chip designs. Currently, there is no way to determine if third-pa...
     
On the feasibility of online malware detection with performance counters
Found in: Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13)
By Adam Waksman, Adrian Tang, Jared Schmitz, John Demme, Matthew Maycock, Salvatore Stolfo, Simha Sethumadhavan
Issue Date:June 2013
pp. 559-570
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the existence o...
     
Side-channel vulnerability factor: a metric for measuring information leakage
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By Adam Waksman, John Demme, Robert Martin, Simha Sethumadhavan
Issue Date:June 2012
pp. 106-117
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. However there is currently no systematic, holistic methodology for understanding in...
     
 1