Secret Spilling Drive: Leaking User Behavior through SSD Contention
Covert channels and side channels bypass architectural security boundaries. Numerous
works have studied covert channels and side channels in software and hardware. Thus …
works have studied covert channels and side channels in software and hardware. Thus …
{SnailLoad}: Exploiting Remote Network Latency Measurements without {JavaScript}
Inferring user activities on a computer from network traffic is a well-studied attack vector.
Previous work has shown that they can infer websites visited, videos watched, and even …
Previous work has shown that they can infer websites visited, videos watched, and even …
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Interrupts are fundamental for inter-process and cross-core communication in modern
systems. Controlling these communication mechanisms historically requires switches into …
systems. Controlling these communication mechanisms historically requires switches into …
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …
side-channel leakage. One approach to eliminate this leakage is to not share hardware …
I Know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs
Operating Systems enforce logical isolation using abstractions such as processes,
containers, and isolation technologies to protect a system from malicious or buggy code. In …
containers, and isolation technologies to protect a system from malicious or buggy code. In …
Exploiting Physical Side-Channel Information for Offensive and Defensive Ends
S Liang - 2024 - search.proquest.com
Side-channel information consists of side effects of computation that range from
microarchitectural to physical phenomena. Empirical studies have demonstrated the …
microarchitectural to physical phenomena. Empirical studies have demonstrated the …
[HTML][HTML] 网站指纹攻击综述
冯雨思 - Computer Science and Application, 2024 - hanspub.org
网站指纹攻击利用统计方法来确定用户**在访问的网站, 侵犯用户隐私, 给互联网的安全和隐私
带来了巨大挑战. 网站指纹攻击首先收集用户访问不同网站时的数据, 然后使用机器学**等方法 …
带来了巨大挑战. 网站指纹攻击首先收集用户访问不同网站时的数据, 然后使用机器学**等方法 …