Aug. 5, 2022, 1:20 a.m. | Martin Schwarzl, Erik Kraft, Daniel Gruss

cs.CR updates on arXiv.org arxiv.org

Cache template attacks demonstrated automated leakage of user input in shared
libraries. However, for large binaries, the runtime is prohibitively high.
Other automated approaches focused on cryptographic implementations and media
software but are not directly applicable to user input. Hence, discovering and
eliminating all user input side-channel leakage on a cache-line granularity
within huge code bases are impractical.


In this paper, we present a new generic cache template attack technique,
LBTA, layered binary templating attacks. LBTA uses multiple coarser-grained
side …

binary compiler detection

Security Engineer

@ Celonis | Munich, Germany

Security Engineer, Cloud Threat Intelligence

@ Google | Reston, VA, USA; Kirkland, WA, USA

IT Security Analyst*

@ EDAG Group | Fulda, Hessen, DE, 36037

Scrum Master/ Agile Project Manager for Information Security (Temporary)

@ Guidehouse | Lagunilla de Heredia

Waste Incident Responder (Tanker Driver)

@ Severn Trent | Derby , England, GB

Risk Vulnerability Analyst w/Clearance - Colorado

@ Rothe | Colorado Springs, CO, United States