Secret Spilling Drive: Leaking User Behavior through SSD Contention

J Juffinger, F Rauscher… - Network and …, 2025 - graz.elsevierpure.com
Covert channels and side channels bypass architectural security boundaries. Numerous
works have studied covert channels and side channels in software and hardware. Thus …

{SnailLoad}: Exploiting Remote Network Latency Measurements without {JavaScript}

S Gast, R Czerny, J Juffinger, F Rauscher… - 33rd USENIX Security …, 2024 - usenix.org
Inferring user activities on a computer from network traffic is a well-studied attack vector.
Previous work has shown that they can infer websites visited, videos watched, and even …

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs

F Rauscher, D Gruss - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Interrupts are fundamental for inter-process and cross-core communication in modern
systems. Controlling these communication mechanisms historically requires switches into …

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

L Maar, J Juffinger, T Steinbauer… - … 2025: NDSS 2025, 2025 - graz.elsevierpure.com
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …

I Know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs

C Gu, Y Zhang, N Abu-Ghazaleh - arxiv preprint arxiv:2411.10883, 2024 - arxiv.org
Operating Systems enforce logical isolation using abstractions such as processes,
containers, and isolation technologies to protect a system from malicious or buggy code. In …

Exploiting Physical Side-Channel Information for Offensive and Defensive Ends

S Liang - 2024 - search.proquest.com
Side-channel information consists of side effects of computation that range from
microarchitectural to physical phenomena. Empirical studies have demonstrated the …

[HTML][HTML] 网站指纹攻击综述

冯雨思 - Computer Science and Application, 2024 - hanspub.org
网站指纹攻击利用统计方法来确定用户**在访问的网站, 侵犯用户隐私, 给互联网的安全和隐私
带来了巨大挑战. 网站指纹攻击首先收集用户访问不同网站时的数据, 然后使用机器学**等方法 …