Pathfinder: High-resolution control-flow attacks exploiting the conditional branch predictor
This paper introduces novel attack primitives that enable adversaries to leak (read) and
manipulate (write) the path history register (PHR) and the prediction history tables (PHTs) of …
manipulate (write) the path history register (PHR) and the prediction history tables (PHTs) of …
This is how you lose the transient execution war
A Randal - arxiv preprint arxiv:2309.03376, 2023 - arxiv.org
A new class of vulnerabilities related to speculative and out-of-order execution, fault-
injection, and microarchitectural side channels rose to attention in 2018. The techniques …
injection, and microarchitectural side channels rose to attention in 2018. The techniques …
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors
Control-flow leakage (CFL) attacks enable an attacker to expose control-flow decisions of a
victim program via side-channel observations. Linearization (ie elimination) of secret …
victim program via side-channel observations. Linearization (ie elimination) of secret …
[PDF][PDF] SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves
This short paper presents insights from our experience in maintaining SGX-Step, an open-
source attack framework designed to facilitate vulnerability research on Intel Software Guard …
source attack framework designed to facilitate vulnerability research on Intel Software Guard …
uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem
H Lim, J Kim, H Lee - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Ensuring data confidentiality in a computing system's memory hierarchy proved to be a
formidable challenge with the large attack surface. Diverse and powerful attacks threaten …
formidable challenge with the large attack surface. Diverse and powerful attacks threaten …
Oxpecker: Leaking Secrets via Fetch Target Queue
S Li, Z Xu, H Shen, H Li - IEEE Transactions on Computer …, 2025 - ieeexplore.ieee.org
Modern processors integrate carefully designed micro-architectural components within the
front-end to optimize performance. These components include instruction cache, micro …
front-end to optimize performance. These components include instruction cache, micro …
[PDF][PDF] MDPeek: Breaking Balanced Branches in SGX with Memory Disambiguation Unit Side Channels
In recent years, control flow attacks targeting Intel SGX have attracted significant attention
from the security community due to their potent capacity for information leakage. Although …
from the security community due to their potent capacity for information leakage. Although …
Transient execution vulnerabilities in the security context of server hardware
A Randal - 2023 - cl.cam.ac.uk
Many mitigations have been proposed and implemented for many variants of the transient
execution vulnerabilities, and while the Meltdown-type exception-based transient execution …
execution vulnerabilities, and while the Meltdown-type exception-based transient execution …
Principled approaches for mitigating micro-architectural side-channel attacks
J Yu - 2023 - ideals.illinois.edu
Micro-architectural side-channel attacks are a critical security threat that arises as a result of
modern processors' pursuit of performance and efficiency. In those attacks, malicious actors …
modern processors' pursuit of performance and efficiency. In those attacks, malicious actors …