Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

Transient-execution attacks: A computer architect perspective

L Fiolhais, L Sousa - ACM Computing Surveys, 2023 - dl.acm.org
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …

WRITE+ SYNC: software cache write covert channels exploiting memory-disk synchronization

C Chen, J Cui, G Qu, J Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …

Rage against the machine clear: A systematic analysis of machine clears and their implications for transient execution attacks

H Ragab, E Barberis, H Bos, C Giuffrida - 30th USENIX Security …, 2021 - usenix.org
Since the discovery of the Spectre and Meltdown vulnerabilities, transient execution attacks
have increasingly gained momentum. However, while the community has investigated …

Adversarial prefetch: New cross-core cache side channel attacks

Y Guo, A Zigerelli, Y Zhang… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Modern x86 processors have many prefetch instructions that can be used by programmers
to boost performance. However, these instructions may also cause security problems. In …

{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels

M Taram, X Ren, A Venkat, D Tullsen - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …

Spy in the gpu-box: Covert and side channel attacks on multi-gpu systems

SB Dutta, H Naghibijouybari, A Gupta… - Proceedings of the 50th …, 2023 - dl.acm.org
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …

Binoculars:{Contention-Based}{Side-Channel} attacks exploiting the page walker

ZN Zhao, A Morrison, CW Fletcher… - 31st USENIX Security …, 2022 - usenix.org
Microarchitectural side channels are a pressing security threat. These channels are created
when programs modulate hardware resources in a secret data-dependent fashion. They are …

{Side-Channel} Attacks on Optane Persistent Memory

S Liu, S Kanniwadi, M Schwarzl, A Kogler… - 32nd USENIX Security …, 2023 - usenix.org
There is a constant evolution of technology for cloud environments, including the
development of new memory storage technology, such as persistent memory. The newly …

Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning

G Saileshwar, S Kariyappa… - … Symposium on Secure …, 2021 - ieeexplore.ieee.org
Cache partitioning is a principled defense against side-channel attacks on shared last-level
caches (LLCs). Such defenses allocate isolated cache regions to distrusting applications …