A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures

M Yan, CW Fletcher, J Torrellas - 29th USENIX Security Symposium …, 2020 - usenix.org
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …

{CURE}: A security architecture with {CUstomizable} and resilient enclaves

R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …

New attacks and defense for encrypted-address cache

MK Qureshi - Proceedings of the 46th International Symposium on …, 2019 - dl.acm.org
Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-
running application by orchestrating evictions via cache conflicts. Such attacks can be …

NDA: Preventing speculative execution attacks at their source

O Weisse, I Neal, K Loughlin, TF Wenisch… - Proceedings of the 52nd …, 2019 - dl.acm.org
Speculative execution attacks like Meltdown and Spectre work by accessing secret data in
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …

Website fingerprinting through the cache occupancy channel and its real world practicality

A Shusterman, Z Avraham, E Croitoru… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Website fingerprinting attacks use statistical analysis on network traffic to compromise user
privacy. The classical attack model used to evaluate website fingerprinting attacks assumes …

Theory and practice of finding eviction sets

P Vila, B Köpf, JF Morales - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
Many micro-architectural attacks rely on the capability of an attacker to efficiently find small
eviction sets: groups of virtual addresses that map to the same cache set. This capability has …

Mi6: Secure enclaves in a speculative out-of-order processor

T Bourgeat, I Lebedev, A Wright, S Zhang… - Proceedings of the …, 2019 - dl.acm.org
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …