Feb. 25, 2022, 2:20 a.m. | Nils Wistoff, Moritz Schneider, Frank K. Gürkaynak, Gernot Heiser, Luca Benini

cs.CR updates on arXiv.org arxiv.org

Microarchitectural timing channels enable unwanted information flow across
security boundaries, violating fundamental security assumptions. They leverage
timing variations of several state-holding microarchitectural components and
have been demonstrated across instruction set architectures and hardware
implementations. Analogously to memory protection, Ge et al. have proposed time
protection for preventing information leakage via timing channels. They also
showed that time protection calls for hardware support. This work leverages the
open and extensible RISC-V instruction set architecture (ISA) to introduce the
temporal fence instruction …

prevention

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Penetration Tester

@ Resillion | Bengaluru, India

Senior Backend Software Engineer (Java) - Privacy Engineering (Open to remote across ANZ)

@ Canva | Sydney, Australia

(Senior) Information Security Professional (w/m/d)

@ IONOS | Deutschland - Remote

Information Security (Incident Response) Intern

@ Eurofins | Katowice, Poland

Game Penetration Tester

@ Magic Media | Belgrade, Vojvodina, Serbia - Remote