Pathfinder: High-resolution control-flow attacks exploiting the conditional branch predictor

H Yavarzadeh, A Agarwal, M Christman… - Proceedings of the 29th …, 2024 - dl.acm.org
This paper introduces novel attack primitives that enable adversaries to leak (read) and
manipulate (write) the path history register (PHR) and the prediction history tables (PHTs) of …

This is how you lose the transient execution war

A Randal - arxiv preprint arxiv:2309.03376, 2023 - arxiv.org
A new class of vulnerabilities related to speculative and out-of-order execution, fault-
injection, and microarchitectural side channels rose to attention in 2018. The techniques …

Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors

H Winderix, M Bognar, LA Daniel… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Control-flow leakage (CFL) attacks enable an attacker to expose control-flow decisions of a
victim program via side-channel observations. Linearization (ie elimination) of secret …

[PDF][PDF] SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves

J Van Bulck, F Piessens - 39th Annual Computer Security …, 2023 - lirias.kuleuven.be
This short paper presents insights from our experience in maintaining SGX-Step, an open-
source attack framework designed to facilitate vulnerability research on Intel Software Guard …

uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem

H Lim, J Kim, H Lee - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Ensuring data confidentiality in a computing system's memory hierarchy proved to be a
formidable challenge with the large attack surface. Diverse and powerful attacks threaten …

Oxpecker: Leaking Secrets via Fetch Target Queue

S Li, Z Xu, H Shen, H Li - IEEE Transactions on Computer …, 2025 - ieeexplore.ieee.org
Modern processors integrate carefully designed micro-architectural components within the
front-end to optimize performance. These components include instruction cache, micro …

[PDF][PDF] MDPeek: Breaking Balanced Branches in SGX with Memory Disambiguation Unit Side Channels

C Liu, S Feng, Y Li, D Wang, W He, Y Lyu, TE Carlson - 2025 - comp.nus.edu.sg
In recent years, control flow attacks targeting Intel SGX have attracted significant attention
from the security community due to their potent capacity for information leakage. Although …

Transient execution vulnerabilities in the security context of server hardware

A Randal - 2023 - cl.cam.ac.uk
Many mitigations have been proposed and implemented for many variants of the transient
execution vulnerabilities, and while the Meltdown-type exception-based transient execution …

Principled approaches for mitigating micro-architectural side-channel attacks

J Yu - 2023 - ideals.illinois.edu
Micro-architectural side-channel attacks are a critical security threat that arises as a result of
modern processors' pursuit of performance and efficiency. In those attacks, malicious actors …