Augury: Using data memory-dependent prefetchers to leak data at rest
Microarchitectural side-channel attacks are enjoying a time of explosive growth, mostly
fueled by novel transient execution vulnerabilities. These attacks are capable of leaking …
fueled by novel transient execution vulnerabilities. These attacks are capable of leaking …
Synchronization Storage Channels ({{{{{S2C)}}}}}: Timer-less Cache {Side-Channel} Attacks on the Apple M1 via Hardware Synchronization Instructions
Shared caches have been a prime target for mounting crossprocess/core side-channel
attacks. Fundamentally, these attacks require a mechanism to accurately observe changes …
attacks. Fundamentally, these attacks require a mechanism to accurately observe changes …
Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time”
Software-based countermeasures provide effective mitigation against side-channel attacks,
often with minimal efficiency and deployment overheads. Their effectiveness is often …
often with minimal efficiency and deployment overheads. Their effectiveness is often …
Indirector:{High-Precision} Branch Target Injection Attacks Exploiting the Indirect Branch Predictor
This paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging
the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer …
the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer …
Data oblivious ISA extensions for side channel-resistant and high performance computing
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in
hardware security today. Recently, there has been a surge of effort that attempts to block …
hardware security today. Recently, there has been a surge of effort that attempts to block …
Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level
The constant-time programming discipline (CT) is an efficient countermeasure against timing
side-channel attacks, requiring the control flow and the memory accesses to be independent …
side-channel attacks, requiring the control flow and the memory accesses to be independent …
Opening pandora's box: A systematic study of new ways microarchitecture can leak private data
Microarchitectural attacks have plunged Computer Architecture into a security crisis. Yet, as
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
Ct-wasm: type-driven secure cryptography for the web ecosystem
A significant amount of both client and server-side cryptography is implemented in
JavaScript. Despite widespread concerns about its security, no other language has been …
JavaScript. Despite widespread concerns about its security, no other language has been …
FaCT: a DSL for timing-sensitive computation
S Cauligi, G Soeller, B Johannesmeyer… - Proceedings of the 40th …, 2019 - dl.acm.org
Real-world cryptographic code is often written in a subset of C intended to execute in
constant-time, thereby avoiding timing side channel vulnerabilities. This C subset eschews …
constant-time, thereby avoiding timing side channel vulnerabilities. This C subset eschews …
The last mile: High-assurance and high-speed cryptographic implementations
We develop a new approach for building cryptographic implementations. Our approach
goes the last mile and delivers assembly code that is provably functionally correct, protected …
goes the last mile and delivers assembly code that is provably functionally correct, protected …