Quantifying side-channels based memory leakage
Title: Quantifying side-channels based memory leakage
DNr: SNIC 2020/5-402
Project Type: SNIC Medium Compute
Principal Investigator: Ahmed Rezine <ahmed.rezine@liu.se>
Affiliation: Linköpings universitet
Duration: 2020-10-01 – 2021-10-01
Classification: 10201
Homepage: http://ida.liu.se/~ahmre43
Keywords:

Abstract

Micro-architecture based timing side-channel attacks (e.g., recent Meltdown, Spectre and Foreshadow attacks) are difficult to uncover and defend against. These threats undermine fundamental constructions in modern computer systems, such as virtual memory and user/kernal spaces separation. We aim to develop a framework that will allow to systematically assess and validate arbitrary programs against realistic classes of timing-channel attacks for entire families of micro-architectural configurations. The vision is a symbolic framework that can reproduce current and future attacks and that formally verifies and rigorously quantifies capacities and weight-distributions of timing-channels attack-observations for entire families of micro-architectural configurations.