Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

{GoFetch}: Breaking {Constant-Time} Cryptographic Implementations Using Data {Memory-Dependent} Prefetchers

B Chen, Y Wang, P Shome, C Fletcher… - 33rd USENIX Security …, 2024 - usenix.org
Microarchitectural side-channel attacks have shaken the foundations of modern processor
design. The cornerstone defense against these attacks has been to ensure that security …

Lightweight fault isolation: Practical, efficient, and secure software sandboxing

Z Yedidia - Proceedings of the 29th ACM International Conference …, 2024 - dl.acm.org
Software-based fault isolation (SFI) is a longstanding technique that allows isolation of one
or more processes from each other with minimal or no use of hardware protection …

{Invalidate+ Compare}: A {Timer-Free}{GPU} Cache Attack Primitive

Z Zhang, K Cai, Y Guo, F Yao, X Gao - 33rd USENIX Security …, 2024 - usenix.org
While extensive research has been conducted on CPU cache side-channel attacks, the
landscape of similar studies on modern GPUs remains largely uncharted. In this paper, we …

Segscope: Probing fine-grained interrupts via architectural footprints

X Zhang, Z Zhang, Q Shen, W Wang… - … Symposium on High …, 2024 - ieeexplore.ieee.org
Interrupts are critical hardware resources for OS kernels to schedule processes. As they are
related to system activities, interrupts can be used to mount various side-channel attacks (ie …

Sysbumps: Exploiting speculative execution in system calls for breaking kaslr in macos for apple silicon

H Jang, T Kim, Y Shin - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Apple silicon is the proprietary ARM-based processor that powers the mainstream of Apple
devices. The move to this proprietary architecture presents unique challenges in addressing …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …

Deepcache: Revisiting cache side-channel attacks in deep neural networks executables

Z Liu, Y Yuan, Y Chen, S Hu, T Li, S Wang - Proceedings of the 2024 on …, 2024 - dl.acm.org
Deep neural networks (DNN) are increasingly deployed in heterogeneous hardware,
including high-performance devices like GPUs and low-power devices like mobile/IoT …

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

L Maar, J Juffinger, T Steinbauer… - … 2025: NDSS 2025, 2025 - graz.elsevierpure.com
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …

The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations

L Binosi, G Barzasi, M Carminati, S Zanero… - Proceedings of the 2024 …, 2024 - dl.acm.org
Address Space Layout Randomization (ASLR) is a crucial defense mechanism employed by
modern operating systems to mitigate exploitation by randomizing processes? memory …