A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Are coherence protocol states vulnerable to information leakage?
F Yao, M Doroslovacki… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Most commercial multi-core processors incorporate hardware coherence protocols to
support efficient data transfers and updates between their constituent cores. While hardware …
support efficient data transfers and updates between their constituent cores. While hardware …
Obfusmem: A low-overhead access obfuscation for trusted memories
Trustworthy software requires strong privacy and security guarantees from a secure trust
base in hardware. While chipmakers provide hardware support for basic security and …
base in hardware. While chipmakers provide hardware support for basic security and …
Nested enclave: Supporting fine-grained hierarchical isolation with sgx
Although hardware-based trusted execution environments (TEEs) have evolved to provide
strong isolation with efficient hardware supports, their current monolithic model poses …
strong isolation with efficient hardware supports, their current monolithic model poses …
Stealthy tracking of autonomous vehicles with cache side channels
Autonomous vehicles are becoming increasingly popular, but their reliance on computer
systems to sense and operate in the physical world introduces new security risks. In this …
systems to sense and operate in the physical world introduces new security risks. In this …
Cyclone: Detecting contention-based cache information leaks through cyclic interference
Micro-architecture units like caches are notorious for leaking secrets across security
domains. An attacker program can contend for on-chip state or bandwidth and can even use …
domains. An attacker program can contend for on-chip state or bandwidth and can even use …
Compact leakage-free support for integrity and reliability
The memory system is vulnerable to a number of security breaches, eg, an attacker can
interfere with program execution by disrupting values stored in memory. Modern Intel® …
interfere with program execution by disrupting values stored in memory. Modern Intel® …
Cooperative path-oram for effective memory bandwidth sharing in server settings
Path ORAM (Oblivious RAM) is a recently proposed ORAM protocol for preventing
information leakage from memory access sequences. It receives wide adoption due to its …
information leakage from memory access sequences. It receives wide adoption due to its …
Uncore Encore: Covert Channels Exploiting Uncore Frequency Scaling
Modern processors dynamically adjust clock frequencies and voltages to reduce energy
consumption. Recent Intel processors separate the uncore frequency from the core …
consumption. Recent Intel processors separate the uncore frequency from the core …