Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–10 of 10 results for author: Schwarzl, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.10740  [pdf, ps, other

    cs.CR

    TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption

    Authors: Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, Stefan Mangard

    Abstract: Efficient cloud computing relies on in-process isolation to optimize performance by running workloads within a single process. Without heavy-weight process isolation, memory safety errors pose a significant security threat by allowing an adversary to extract or corrupt the private data of other co-located tenants. Existing in-process isolation mechanisms are not suitable for modern cloud requireme… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  2. arXiv:2208.02093  [pdf, other

    cs.CR

    Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage

    Authors: Martin Schwarzl, Erik Kraft, Daniel Gruss

    Abstract: Cache template attacks demonstrated automated leakage of user input in shared libraries. However, for large binaries, the runtime is prohibitively high. Other automated approaches focused on cryptographic implementations and media software but are not directly applicable to user input. Hence, discovering and eliminating all user input side-channel leakage on a cache-line granularity within huge co… ▽ More

    Submitted 4 August, 2022; v1 submitted 3 August, 2022; originally announced August 2022.

  3. arXiv:2111.12528  [pdf

    cs.CR

    Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks

    Authors: Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss

    Abstract: In this paper, we analyze the security of programming languages and their execution environments (compilers and interpreters) with respect to Spectre attacks. The analysis shows that only 16 out of 42 execution environments have mitigations against at least one Spectre variant, i.e., 26 have no mitigations against any Spectre variant. Using our novel tool Speconnector, we develop Spectre proof-of-… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  4. arXiv:2111.08553  [pdf, other

    cs.CR

    Remote Memory-Deduplication Attacks

    Authors: Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss

    Abstract: Memory utilization can be reduced by merging identical memory blocks into copy-on-write mappings. Previous work showed that this so-called memory deduplication can be exploited in local attacks to break ASLR, spy on other programs,and determine the presence of data, i.e., website images. All these attacks exploit memory deduplication across security domains, which in turn was disabled. However, wi… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  5. arXiv:2111.08404  [pdf, other

    cs.CR

    Practical Timing Side Channel Attacks on Memory Compression

    Authors: Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss

    Abstract: Compression algorithms are widely used as they save memory without losing data. However, elimination of redundant symbols and sequences in data leads to a compression side channel. So far, compression attacks have only focused on the compression-ratio side channel, i.e., the size of compressed data,and largely targeted HTTP traffic and website content. In this paper, we present the first memory… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  6. arXiv:2110.04751  [pdf, other

    cs.CR

    Dynamic Process Isolation

    Authors: Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, Michael Schwarz

    Abstract: In the quest for efficiency and performance, edge-computing providers eliminate isolation boundaries between tenants, such as strict process isolation, and instead let them compute in a more lightweight multi-threaded single-process design. Edge-computing providers support a high number of tenants per machine to reduce the physical distance to customers without requiring a large number of machines… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  7. arXiv:2010.05988  [pdf, other

    cs.HC

    Evaluating Mixed and Augmented Reality: A Systematic Literature Review (2009-2019)

    Authors: Leonel Merino, Magdalena Schwarzl, Matthias Kraus, Michael Sedlmair, Dieter Schmalstieg, Daniel Weiskopf

    Abstract: We present a systematic review of 458 papers that report on evaluations in mixed and augmented reality (MR/AR) published in ISMAR, CHI, IEEE VR, and UIST over a span of 11 years (2009-2019). Our goal is to provide guidance for future evaluations of MR/AR approaches. To this end, we characterize publications by paper type (e.g., technique, design study), research topic (e.g., tracking, rendering),… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: ISMAR

    ACM Class: I.3.7; A.1

  8. arXiv:2008.02307  [pdf, other

    cs.CR

    Speculative Dereferencing of Registers:Reviving Foreshadow

    Authors: Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss

    Abstract: Since 2016, multiple microarchitectural attacks have exploited an effect that is attributed to prefetching. These works observe that certain user-space operations can fetch kernel addresses into the cache. Fetching user-inaccessible data into the cache enables KASLR breaks and assists various Meltdown-type attacks, especially Foreshadow. In this paper, we provide a systematic analysis of the roo… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 16 pages, 6 figures

  9. arXiv:1812.07273  [pdf, other

    cs.GR

    cellPACKexplorer: Interactive Model Building for Volumetric Data of Complex Cells

    Authors: M. Schwarzl, L. Autin, G. Johnson, T. Torsney-Weir, T. Möller

    Abstract: Given an algorithm the quality of the output largely depends on a proper specification of the input parameters. A lot of work has been done to analyze tasks related to using a fixed model [25] and finding a good set of inputs. In this paper we present a different scenario, model building. In contrast to model usage the underlying algorithm, i.e. the underlying model, changes and therefore the asso… ▽ More

    Submitted 18 December, 2018; originally announced December 2018.

  10. arXiv:1807.10535  [pdf, ps, other

    cs.CR

    NetSpectre: Read Arbitrary Memory over Network

    Authors: Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss

    Abstract: In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first Spectre attack which does not use a cache covert channel. Instead, we present a novel high-performa… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.