Controlled-channel attacks: Deterministic side channels for untrusted operating systems

Y Xu, W Cui, M Peinado - 2015 IEEE Symposium on Security …, 2015 - ieeexplore.ieee.org
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017 - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization

KZ Snow, F Monrose, L Davi… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …

Practical timing side channel attacks against kernel space ASLR

R Hund, C Willems, T Holz - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to
protect both user space and kernel space code have been developed in the past years. A …

Jump over ASLR: Attacking branch predictors to bypass ASLR

D Evtyushkin, D Ponomarev… - 2016 49th Annual …, 2016 - ieeexplore.ieee.org
Address Space Layout Randomization (ASLR) is a widely-used technique that protects
systems against a range of attacks. ASLR works by randomizing the offset of key program …

Hacking blind

A Bittau, A Belay, A Mashtizadeh… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
We show that it is possible to write remote stack buffer overflow exploits without possessing
a copy of the target binary or source code, against services that restart after a crash. This …

[PDF][PDF] ASLR on the Line: Practical Cache Attacks on the MMU.

B Gras, K Razavi, E Bosman, H Bos, C Giuffrida - NDSS, 2017 - hydra.azilian.net
Address space layout randomization (ASLR) is an important first line of defense against
memory corruption attacks and a building block for many modern countermeasures. Existing …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

Side channel attacks for architecture extraction of neural networks

H Chabanne, JL Danger, L Guiga… - CAAI Transactions on …, 2021 - Wiley Online Library
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving
secret information from NNs. We differentiate multiple types of threat scenarios regarding …