Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …
browsing activity. Hiding browsing activity is essential for Internet users to increase their …
Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
Mi6: Secure enclaves in a speculative out-of-order processor
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
Prime+ Scope: Overcoming the observer effect for high-precision cache contention attacks
Modern processors expose software to information leakage through shared
microarchitectural state. One of the most severe leakage channels is cache contention …
microarchitectural state. One of the most severe leakage channels is cache contention …
{MIRAGE}: Mitigating {Conflict-Based} Cache Attacks with a Practical {Fully-Associative} Design
Shared caches in processors are vulnerable to conflict-based side-channel attacks, whereby
an attacker can monitor the access pattern of a victim by evicting victim cache lines using …
an attacker can monitor the access pattern of a victim by evicting victim cache lines using …
{HybCache}: Hybrid {Side-Channel-Resilient} caches for trusted execution environments
Modern multi-core processors share cache resources for maximum cache utilization and
performance gains. However, this leaves the cache vulnerable to side-channel attacks …
performance gains. However, this leaves the cache vulnerable to side-channel attacks …
Synchronization Storage Channels ({{{{{S2C)}}}}}: Timer-less Cache {Side-Channel} Attacks on the Apple M1 via Hardware Synchronization Instructions
Shared caches have been a prime target for mounting crossprocess/core side-channel
attacks. Fundamentally, these attacks require a mechanism to accurately observe changes …
attacks. Fundamentally, these attacks require a mechanism to accurately observe changes …
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Page 1
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …