PACMAN: attacking ARM pointer authentication with speculative execution

J Ravichandran, WT Na, J Lang, M Yan - Proceedings of the 49th …, 2022 - dl.acm.org
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …

Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture

P Borrello, A Kogler, M Schwarzl, M Lipp… - 31st USENIX Security …, 2022 - usenix.org
CPU vulnerabilities undermine the security guarantees provided by software-and hardware-
security improvements. While the discovery of transient-execution attacks increased the …

Prime+ Scope: Overcoming the observer effect for high-precision cache contention attacks

A Purnal, F Turan, I Verbauwhede - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Modern processors expose software to information leakage through shared
microarchitectural state. One of the most severe leakage channels is cache contention …

It's all in your head (set): Side-channel attacks on {AR/VR} systems

Y Zhang, C Slocum, J Chen… - 32nd USENIX Security …, 2023 - usenix.org
With the increasing adoption of Augmented Reality/Virtual Reality (AR/VR) systems, security
and privacy concerns attract attention from both academia and industry. This paper …

Augury: Using data memory-dependent prefetchers to leak data at rest

JRS Vicarte, M Flanders, R Paccagnella… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Microarchitectural side-channel attacks are enjoying a time of explosive growth, mostly
fueled by novel transient execution vulnerabilities. These attacks are capable of leaking …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

Rage against the machine clear: A systematic analysis of machine clears and their implications for transient execution attacks

H Ragab, E Barberis, H Bos, C Giuffrida - 30th USENIX Security …, 2021 - usenix.org
Since the discovery of the Spectre and Meltdown vulnerabilities, transient execution attacks
have increasingly gained momentum. However, while the community has investigated …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

{NVLeak}:{Off-Chip}{Side-Channel} Attacks via {Non-Volatile} Memory Systems

Z Wang, M Taram, D Moghimi, S Swanson… - 32nd USENIX Security …, 2023 - usenix.org
We study microarchitectural side-channel attacks and defenses on non-volatile RAM
(NVRAM) DIMMs. In this study, we first perform reverse-engineering of NVRAMs as …