Survey of microarchitectural side and covert channels, attacks, and defenses
J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …
exfiltrating information for a computer system. Processor microarchitectural timing-based …
Spectre returns! speculation attacks using the return stack buffer
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …
modern microprocessors, to allow the exfiltration of sensitive data across protection …
Flush+ Flush: a fast and stealthy cache attack
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
Catalyst: Defeating last-level cache side channel attacks in cloud computing
Cache side channel attacks are serious threats to multi-tenant public cloud platforms. Past
work showed how secret information in one virtual machine (VM) can be extracted by …
work showed how secret information in one virtual machine (VM) can be extracted by …
A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Raccoon: Closing digital {Side-Channels} through obfuscated execution
Side-channel attacks monitor some aspect of a computer system's behavior to infer the
values of secret data. Numerous side-channels have been exploited, including those that …
values of secret data. Numerous side-channels have been exploited, including those that …
Random fill cache architecture
Correctly functioning caches have been shown to leak critical secrets like encryption keys,
through various types of cache side-channel attacks. This nullifies the security provided by …
through various types of cache side-channel attacks. This nullifies the security provided by …
{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud
T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …
availability, and on-demand scaling. To achieve these promises, cloud providers share …
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Privacy and information security in general are major concerns that impede enterprise
adaptation of shared or public cloud computing. Specifically, the concern of virtual machine …
adaptation of shared or public cloud computing. Specifically, the concern of virtual machine …