USING WEAK MEMORY MODELS TO UNCOVER VULNERABLE MICROARCHITECTURAL BEHAVIOUR
Lead Research Organisation:
University of Kent
Department Name: Sch of Computing
Abstract
Many recent side-channel attacks have focused on exposing microarchitectural behaviour to gain knowledge of the system state that is traditionally hidden from the user. In some cases, the mechanisms involved are also responsible for observed weak memory behaviour. This project seeks to use existing weak memory tools and models to expose further microarchitectural weaknesses that would allow for potential security attacks, along with proposed mitigations against them.
Organisations
People |
ORCID iD |
Mark Batty (Primary Supervisor) | |
Sam Dawson (Student) |
Studentship Projects
Project Reference | Relationship | Related To | Start | End | Student Name |
---|---|---|---|---|---|
EP/R513246/1 | 01/10/2018 | 30/09/2023 | |||
2119793 | Studentship | EP/R513246/1 | 01/10/2018 | 31/12/2021 | Sam Dawson |