Monthly Archives: January 2016
Working with colleagues from Princeton University, NICTA and Intel we show how to use the Intel Cache Allocation Technology (CAT) to provide protection from cache-based side-channel attacks. CAT is a hardware cache-partitioning mechanism for enforcing quality of service with respect to cache occupancy. However due to the small number of partitions it cannot be used […]
An update on our MEDEA model-driven engineering environment supporting early performance prediction of Systems of Systems has been accepted for publication in the Journal of Software and Systems Modeling. The MEDEA system is an outcome of our long standing collaboration with DST Group, and colleagues at the University of Pau. K. Falkner, C. Szabo, V. […]
Research Grant: Assessment and OS-Level Mitigation of Timing Channels. Y.Yarom and K. Falkner, NICTA CRP Research Agreement ($132,378) (2015-2016)
Our collaboration with NICTA’s Software Systems Research Group (UNSW) continues with an extension of our CRP Research Agreement in the area of Security and Virtualisation. Dr Yuval Yarom leads this latest grant collaboration, which will survey micro-architectural time-based covert channels and side channels on modern architectures. It will survey existing exploits and mitigation strategies, and attempt […]
As part of our ongoing collaboration with the Laboratory for Experimental Information Security (LEISec), our intern, Tom Allan, was invited to an extended visit To Israel. Tom will spend six weeks in the Tel-Aviv University, where he will work on microarchitectural side-channel attacks.