Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

{DOLMA}: Securing speculation with the principle of transient {Non-Observability}

K Loughlin, I Neal, J Ma, E Tsai, O Weisse… - 30th USENIX Security …, 2021 - usenix.org
Modern processors allow attackers to leak data during transient (ie, mis-speculated)
execution through microarchitectural covert timing channels. While initial defenses were …

Augury: Using data memory-dependent prefetchers to leak data at rest

JRS Vicarte, M Flanders, R Paccagnella… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Microarchitectural side-channel attacks are enjoying a time of explosive growth, mostly
fueled by novel transient execution vulnerabilities. These attacks are capable of leaking …

Axiomatic hardware-software contracts for security

N Mosier, H Lachnitt, H Nemati, C Trippel - Proceedings of the 49th …, 2022 - dl.acm.org
We propose leakage containment models (LCMs)---novel axiomatic security contracts which
support formally reasoning about the security guarantees of programs when they run on …

Speculative interference attacks: Breaking invisible speculation schemes

M Behnia, P Sahu, R Paccagnella, J Yu… - Proceedings of the 26th …, 2021 - dl.acm.org
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …

Context: A generic approach for mitigating spectre

M Schwarz, M Lipp, CA Canella… - Network and …, 2020 - graz.elsevierpure.com
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …

Microscope: Enabling microarchitectural replay attacks

D Skarlatos, M Yan, B Gopireddy, R Sprabery… - Proceedings of the 46th …, 2019 - dl.acm.org
The popularity of hardware-based Trusted Execution Environments (TEEs) has recently
skyrocketed with the introduction of Intel's Software Guard Extensions (SGX). In SGX, the …