Search For:

Displaying 1-4 out of 4 total
Protecting Your Software Updates
Found in: IEEE Security & Privacy
By Bart Coppens,Bjorn De Sutter,Koen De Bosschere
Issue Date:March 2013
pp. 47-54
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this...
 
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
Found in: Security and Privacy, IEEE Symposium on
By Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter
Issue Date:May 2009
pp. 45-60
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side-channels that rela...
 
Feedback-driven binary code diversification
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Bart Coppens, Bjorn De Sutter, Jonas Maebe
Issue Date:January 2013
pp. 1-26
As described in many blog posts and in the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches. For example, “Microsoft Patch Tuesday” is often followed by “Exploit Wednesday” du...
     
Compiler mitigations for time attacks on modern x86 processors
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Bart Coppens, Bjorn De Sutter, Jeroen V. Cleemput
Issue Date:January 2012
pp. 1-20
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side channels that rela...
     
 1