no code implementations • 16 Apr 2024 • Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, Thomas Eisenbarth
The cloud computing landscape has evolved significantly in recent years, embracing various sandboxes to meet the diverse demands of modern cloud applications.
1 code implementation • 31 May 2022 • Debopriya Roy Dipta, Berk Gulmezoglu
Unfortunately, previous studies utilize hardware performance counters that lead to high performance overhead and profile limited number of microarchitectural attacks due to the small number of counters that can be profiled concurrently.
1 code implementation • 25 Jun 2020 • M. Caner Tol, Berk Gulmezoglu, Koray Yurtseven, Berk Sunar
In this work, we employ both fuzzing and deep learning techniques to automate the generation and detection of Spectre gadgets.
no code implementations • 8 Jul 2019 • Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar
Therefore, we propose FortuneTeller, which for the first time leverages the superiority of RNNs to learn complex execution patterns and detects unseen microarchitectural attacks in real world systems.
3 code implementations • 1 Mar 2019 • Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
We propose the SPOILER attack which exploits this leakage to speed up this reverse engineering by a factor of 256.
Cryptography and Security
no code implementations • 27 Nov 2018 • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to the privacy of mobile phone users.