Survey of microarchitectural side and covert channels, attacks, and defenses

J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …

Spectre returns! speculation attacks using the return stack buffer

EM Koruyeh, KN Khasawneh, C Song… - 12th USENIX Workshop …, 2018 - usenix.org
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …

Flush+ Flush: a fast and stealthy cache attack

D Gruss, C Maurice, K Wagner, S Mangard - Detection of Intrusions and …, 2016 - Springer
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

Catalyst: Defeating last-level cache side channel attacks in cloud computing

F Liu, Q Ge, Y Yarom, F Mckeen… - … symposium on high …, 2016 - ieeexplore.ieee.org
Cache side channel attacks are serious threats to multi-tenant public cloud platforms. Past
work showed how secret information in one virtual machine (VM) can be extracted by …

A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Raccoon: Closing digital {Side-Channels} through obfuscated execution

A Rane, C Lin, M Tiwari - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Side-channel attacks monitor some aspect of a computer system's behavior to infer the
values of secret data. Numerous side-channels have been exploited, including those that …

Random fill cache architecture

F Liu, RB Lee - 2014 47th Annual IEEE/ACM International …, 2014 - ieeexplore.ieee.org
Correctly functioning caches have been shown to leak critical secrets like encryption keys,
through various types of cache side-channel attacks. This nullifies the security provided by …

{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud

T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …

Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud

Z Wu, Z Xu, H Wang - IEEE/ACM Transactions on Networking, 2014 - ieeexplore.ieee.org
Privacy and information security in general are major concerns that impede enterprise
adaptation of shared or public cloud computing. Specifically, the concern of virtual machine …