Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of key technologies for constructing network covert channel
J Tian, G **} Attacks through Interrupt Awareness for Intel {SGX} Enclaves
Intel® Software Guard Extensions (Intel® SGX) supports the creation of shielded enclaves
within unprivileged processes. While enclaves are architecturally protected against …
within unprivileged processes. While enclaves are architecturally protected against …
{CopyCat}: Controlled {Instruction-Level} attacks on enclaves
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …
researchers to investigate unusual attack vectors. One particularly powerful class of …
Safe curves for elliptic-curve cryptography
Safe curves for elliptic-curve cryptography Page 1 Safe curves for elliptic-curve cryptography
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …
Frontal attack: Leaking {Control-Flow} in {SGX} via the {CPU} frontend
We introduce a new timing side-channel attack on Intel CPU processors. Our Frontal attack
exploits timing differences that arise from how the CPU frontend fetches and processes …
exploits timing differences that arise from how the CPU frontend fetches and processes …
Microwalk-CI: Practical side-channel analysis for JavaScript applications
Secret-dependent timing behavior in cryptographic implementations has resulted in
exploitable vulnerabilities, undermining their security. Over the years, numerous tools to …
exploitable vulnerabilities, undermining their security. Over the years, numerous tools to …
Util:: Lookup: Exploiting key decoding in cryptographic libraries
Implementations of cryptographic libraries have been scrutinized for secret-dependent
execution behavior exploitable by microarchitectural side-channel attacks. To prevent …
execution behavior exploitable by microarchitectural side-channel attacks. To prevent …
Certified side channels
CP García, S Ul Hassan, N Tuveri, I Gridin… - 29th USENIX Security …, 2020 - usenix.org
We demonstrate that the format in which private keys are persisted impacts Side Channel
Analysis (SCA) security. Surveying several widely deployed software libraries, we …
Analysis (SCA) security. Surveying several widely deployed software libraries, we …
[PDF][PDF] SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves
This short paper presents insights from our experience in maintaining SGX-Step, an open-
source attack framework designed to facilitate vulnerability research on Intel Software Guard …
source attack framework designed to facilitate vulnerability research on Intel Software Guard …
[HTML][HTML] SGXDump: a repeatable code-reuse attack for extracting SGX enclave memory
HJ Yoon, MH Lee - Applied Sciences, 2022 - mdpi.com
Intel SGX (Software Guard Extensions) is a hardware-based security solution that provides a
trusted computing environment. SGX creates an isolated memory area called enclave and …
trusted computing environment. SGX creates an isolated memory area called enclave and …