A survey of key technologies for constructing network covert channel

J Tian, G **} Attacks through Interrupt Awareness for Intel {SGX} Enclaves
S Constable, J Van Bulck, X Cheng, Y **ao… - 32nd USENIX Security …, 2023 - usenix.org
Intel® Software Guard Extensions (Intel® SGX) supports the creation of shielded enclaves
within unprivileged processes. While enclaves are architecturally protected against …

{CopyCat}: Controlled {Instruction-Level} attacks on enclaves

D Moghimi, J Van Bulck, N Heninger… - 29th USENIX security …, 2020 - usenix.org
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …

Safe curves for elliptic-curve cryptography

DJ Bernstein, T Lange - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Safe curves for elliptic-curve cryptography Page 1 Safe curves for elliptic-curve cryptography
Daniel J. Bernstein1,2 and Tanja Lange3,2 1 University of Illinois at Chicago, USA 2 Academia …

Frontal attack: Leaking {Control-Flow} in {SGX} via the {CPU} frontend

I Puddu, M Schneider, M Haller, S Čapkun - 30th USENIX Security …, 2021 - usenix.org
We introduce a new timing side-channel attack on Intel CPU processors. Our Frontal attack
exploits timing differences that arise from how the CPU frontend fetches and processes …

Microwalk-CI: Practical side-channel analysis for JavaScript applications

J Wichelmann, F Sieck, A Pätschke… - Proceedings of the 2022 …, 2022 - dl.acm.org
Secret-dependent timing behavior in cryptographic implementations has resulted in
exploitable vulnerabilities, undermining their security. Over the years, numerous tools to …

Util:: Lookup: Exploiting key decoding in cryptographic libraries

F Sieck, S Berndt, J Wichelmann… - Proceedings of the 2021 …, 2021 - dl.acm.org
Implementations of cryptographic libraries have been scrutinized for secret-dependent
execution behavior exploitable by microarchitectural side-channel attacks. To prevent …

Certified side channels

CP García, S Ul Hassan, N Tuveri, I Gridin… - 29th USENIX Security …, 2020 - usenix.org
We demonstrate that the format in which private keys are persisted impacts Side Channel
Analysis (SCA) security. Surveying several widely deployed software libraries, we …

[PDF][PDF] SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves

J Van Bulck, F Piessens - 39th Annual Computer Security …, 2023 - lirias.kuleuven.be
This short paper presents insights from our experience in maintaining SGX-Step, an open-
source attack framework designed to facilitate vulnerability research on Intel Software Guard …

[HTML][HTML] SGXDump: a repeatable code-reuse attack for extracting SGX enclave memory

HJ Yoon, MH Lee - Applied Sciences, 2022 - mdpi.com
Intel SGX (Software Guard Extensions) is a hardware-based security solution that provides a
trusted computing environment. SGX creates an isolated memory area called enclave and …