Skip to main content

Showing 1–3 of 3 results for author: Unterguggenberger, M

  1. arXiv:2407.10740  [pdf, ps, other

    cs.CR

    TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption

    Authors: Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, Stefan Mangard

    Abstract: Efficient cloud computing relies on in-process isolation to optimize performance by running workloads within a single process. Without heavy-weight process isolation, memory safety errors pose a significant security threat by allowing an adversary to extract or corrupt the private data of other co-located tenants. Existing in-process isolation mechanisms are not suitable for modern cloud requireme… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  2. arXiv:2301.02915  [pdf, other

    cs.CR cs.OS

    SFP: Providing System Call Flow Protection against Software and Fault Attacks

    Authors: Robert Schilling, Pascal Nasahl, Martin Unterguggenberger, Stefan Mangard

    Abstract: With the improvements in computing technologies, edge devices in the Internet-of-Things have become more complex. The enabler technology for these complex systems are powerful application core processors with operating system support, such as Linux. While the isolation of applications through the operating system increases the security, the interface to the kernel poses a new threat. Different att… ▽ More

    Submitted 12 January, 2023; v1 submitted 7 January, 2023; originally announced January 2023.

    Comments: Published at HASP22

  3. arXiv:2208.01356  [pdf, other

    cs.CR

    SCFI: State Machine Control-Flow Hardening Against Fault Attacks

    Authors: Pascal Nasahl, Martin Unterguggenberger, Rishub Nagpal, Robert Schilling, David Schrammel, Stefan Mangard

    Abstract: Fault injection (FI) is a powerful attack methodology allowing an adversary to entirely break the security of a target device. As finite-state machines (FSMs) are fundamental hardware building blocks responsible for controlling systems, inducing faults into these controllers enables an adversary to hijack the execution of the integrated circuit. A common defense strategy mitigating these attacks i… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.