BLOGS WEBSITE

Monthly Archives: January 2016

HPCA 2016: CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing

Working with colleagues from Princeton University, NICTA and Intel we show how to use the Intel Cache Allocation Technology (CAT) to provide protection from cache-based side-channel attacks. CAT is a hardware cache-partitioning mechanism for enforcing quality of service with respect to cache occupancy. However due to the small number of partitions it cannot be used […]

Posted in News, Publications, Research, Security | Tagged |

Comments Off on HPCA 2016: CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing

SoSym: Model-driven Performance Prediction of Systems of Systems

An update on our MEDEA model-driven engineering environment supporting early performance prediction of Systems of Systems has been accepted for publication in the Journal of Software and Systems Modeling. The MEDEA system is an outcome of our long standing collaboration with DST Group, and colleagues at the University of Pau. K. Falkner, C. Szabo, V. […]

Posted in Modelling and Analysis, Publications, Research | Tagged |

Comments Off on SoSym: Model-driven Performance Prediction of Systems of Systems

Research Grant: Assessment and OS-Level Mitigation of Timing Channels. Y.Yarom and K. Falkner, NICTA CRP Research Agreement ($132,378) (2015-2016)

Our collaboration with NICTA’s Software Systems Research Group (UNSW) continues with an extension of our CRP Research Agreement in the area of Security and Virtualisation. Dr Yuval Yarom leads this latest grant collaboration, which will survey micro-architectural time-based covert channels and side channels on modern architectures. It will survey existing exploits and mitigation strategies, and attempt […]

Posted in Research, Security | Tagged |

Comments Off on Research Grant: Assessment and OS-Level Mitigation of Timing Channels. Y.Yarom and K. Falkner, NICTA CRP Research Agreement ($132,378) (2015-2016)

Tom Allan invited to Tel-Aviv University

As part of our ongoing collaboration with the Laboratory for Experimental Information Security (LEISec), our intern, Tom Allan, was invited to an extended visit To Israel.  Tom will spend six weeks in the Tel-Aviv University, where he will work on microarchitectural side-channel attacks.

Posted in News, Security | Tagged |

Comments Off on Tom Allan invited to Tel-Aviv University