Moesi-prime: preventing coherence-induced hammering in commodity workloads
Prior work shows that Rowhammer attacks---which flip bits in DRAM via frequent activations
of the same row (s)---are viable. Adversaries typically mount these attacks via instruction …
of the same row (s)---are viable. Adversaries typically mount these attacks via instruction …
Opening pandora's box: A systematic study of new ways microarchitecture can leak private data
Microarchitectural attacks have plunged Computer Architecture into a security crisis. Yet, as
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
Randomized last-level caches are still vulnerable to cache side-channel attacks! but we can fix it
Cache randomization has recently been revived as a promising defense against conflict-
based cache side-channel attacks. As two of the latest implementations, CEASER-S and …
based cache side-channel attacks. As two of the latest implementations, CEASER-S and …
MeshUp: Stateless cache side-channel attack on CPU mesh
Cache side-channel attacks lead to severe security threats to the settings where a CPU is
shared across users, eg, in the cloud. The majority of attacks rely on sensing the micro …
shared across users, eg, in the cloud. The majority of attacks rely on sensing the micro …
Binoculars:{Contention-Based}{Side-Channel} attacks exploiting the page walker
Microarchitectural side channels are a pressing security threat. These channels are created
when programs modulate hardware resources in a secret data-dependent fashion. They are …
when programs modulate hardware resources in a secret data-dependent fashion. They are …
Powspectre: Powering up speculation attacks with tsx-based replay
Trusted execution environment (TEE) offers data protection against malicious system
software. However, the TEE (eg, Intel SGX) threat model exacerbates information leakage as …
software. However, the TEE (eg, Intel SGX) threat model exacerbates information leakage as …
Chunked-cache: On-demand and scalable cache isolation for security architectures
G Dessouky, A Gruler, P Mahmoody… - arxiv preprint arxiv …, 2021 - arxiv.org
Shared cache resources in multi-core processors are vulnerable to cache side-channel
attacks. Recently proposed defenses have their own caveats: Randomization-based …
attacks. Recently proposed defenses have their own caveats: Randomization-based …
Are randomized caches truly random? Formal analysis of randomized-partitioned caches
Cache based side-channel attacks exploit the fact that an adversary can setup the shared
cache memory (the last level cache in modern systems) into a known state and detect any …
cache memory (the last level cache in modern systems) into a known state and detect any …