9 research outputs found

    Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

    Get PDF
    There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging Microarchitectural resources, adversaries can potentially launch Timing-Based Side-Channel Attacks in order to leak information via timing. In view of these security threats against computing hardware, we analyse current attacks that take advantage of Microarchitectural elements in shared computing hardware. Our analysis focuses only on Timing-Based Side-Channel Attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of Side-Channel Attacks which have a broad application range. To this end, we analyse Timing Attacks performed against processor and cache components, again with references to other components when appropriate

    A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

    No full text
    Republished from the International Journal of Data Warehousing and Mining, Vol. 11, No. 2, April-June 2015, 21-42International audienceCloud computing can help reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud rais-es legitimate security concerns. In this paper, we propose a new multi-secret sharing approach for deploying a data warehouse in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity and availability. We first validate the relevance of our ap-proach theoretically, and then experimentally with both a simple random dataset and the Star Schema Benchmark. We also demonstrate its superiority to related, existing methods
    corecore