Monthly Archives: June 2014
Working with colleagues from the University of Bristol and from our local School of Mathematical Sciences, we combine our FLUSH+RELOAD side channel with an improved lattice attack to break the Bitcoin elliptic curve. N. Benger, J. van de Pol, N. P. Smart and Y.Yarom, “Ooh, Aah… Just a Little Bit”: A Small Amount of Side […]
A new side-channel attack that came out of our research into security within virtualised environments has been accepted for publication at USENIX 2014: Y. Yarom and K. Falkner, FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. Accepted for USENIX Security, August 2014.
Dr Vanea Chiprianov, formally a member of the DIG group and now at University of Pau (France), is visiting DIG this week, while attending the SOSE conference. Dr Chiprianov will be presenting a joint paper with DIG on our work in performance modelling of systems of systems.
ECSA 2014: Architectural Support for Model-driven Performance Prediction of Distributed Real-time Embedded Systems of Systems
A description of the software architecture underpinning our performance modelling framework, providing insights into appropriate architectural designs, and architectural design patterns. V. Chiprianov, K. Falkner, C. Szabo and G. Puddy, Architectural Support for Model-driven Performance Prediction of Distributed Real-time Embedded Systems of Systems. Accepted for ECSA 2014, August 2014. In addition, we will also be presenting […]