Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …
included in recent Intel x86 processors, gained significant traction in recent years. A long …
ZombieLoad: Cross-privilege-boundary data sampling
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …
by exploiting side-effects from transient instructions. While this attack has been mitigated …
A survey of Intel SGX and its applications
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
A systematic evaluation of transient execution attacks and defenses
Research on transient execution attacks including Spectre and Meltdown showed that
exception or branch misprediction events might leave secret-dependent traces in the CPU's …
exception or branch misprediction events might leave secret-dependent traces in the CPU's …
Spectre returns! speculation attacks using the return stack buffer
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …
modern microprocessors, to allow the exfiltration of sensitive data across protection …
Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
ret2spec: Speculative execution using return stack buffers
Speculative execution is an optimization technique that has been part of CPUs for over a
decade. It predicts the outcome and target of branch instructions to avoid stalling the …
decade. It predicts the outcome and target of branch instructions to avoid stalling the …
Netspectre: Read arbitrary memory over network
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Low latency privacy preserving inference
When applying machine learning to sensitive data, one has to find a balance between
accuracy, information security, and computational-complexity. Recent studies combined …
accuracy, information security, and computational-complexity. Recent studies combined …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …