Trusted Execution Environments (TEEs) have been proposed as a solution t...
The majority of smartphones either run iOS or Android operating systems....
The growing complexity of modern computing platforms and the need for st...
Microarchitectural timing channels enable unwanted information flow acro...
The majority of smartphones either run iOS or Android operating systems....
Peer methods are a comprehensive class of time integrators offering nume...
While modern computing architectures rely on specialized hardware such a...
We introduce a new timing side-channel attack on Intel CPU processors. O...
Covert channels enable information leakage across security boundaries of...
The demand for more transparency of decision-making processes of deep
re...
Considering a large number of vulnerabilities reported in the news and t...
We investigate identity lease, a new type of service in which users leas...