Sam Jaeschke Joins DIG

We welcome Sam Jaeschke, who has joined DIG to complete his Honours year research project.

Sam work will extend our earlier work on micro-architectural side-channel attacks. Past research has demonstrated that Intel X86 processors are vulnerable to the FLUSH+RELOAD side-channel attack. The attack allows malicious virtual machine to recover secret information from a victim virtual machine by observing the victim’s use of the cache.

Sam will investigate countermeasures against the attack. The main challenge is to provide easy to use, effective techniques that provide protection to sensitive code while minimising performance loss.

This entry was posted in News, Security Research, Student Projects. Bookmark the permalink.

Comments are closed.