Quantifying side-channels based memory leakage
||Quantifying side-channels based memory leakage|
||SNIC Medium Compute|
||Ahmed Rezine <firstname.lastname@example.org>|
||2020-10-01 – 2021-10-01|
Micro-architecture based timing side-channel attacks (e.g., recent Meltdown, Spectre and Foreshadow attacks) are difficult to uncover and defend against. These threats undermine fundamental constructions in modern computer systems, such as virtual memory and user/kernal spaces separation.
We aim to develop a framework that will allow to systematically assess and validate arbitrary programs against realistic classes of timing-channel attacks for entire families of micro-architectural configurations. The vision is a symbolic framework that can reproduce current and future attacks and that formally verifies and rigorously quantifies capacities and weight-distributions of timing-channels attack-observations for entire families of micro-architectural configurations.