Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
Timing side-channel attacks and countermeasures in CPU microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
{ScatterCache}: thwarting cache attacks via cache set randomization
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …
even in the absence of software bugs. Currently, there are no practical and generic …
Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …
appealing research subject for a wide range of computer systems, from low-end embedded …
New attacks and defense for encrypted-address cache
MK Qureshi - Proceedings of the 46th International Symposium on …, 2019 - dl.acm.org
Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-
running application by orchestrating evictions via cache conflicts. Such attacks can be …
running application by orchestrating evictions via cache conflicts. Such attacks can be …
NDA: Preventing speculative execution attacks at their source
Speculative execution attacks like Meltdown and Spectre work by accessing secret data in
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …
Website fingerprinting through the cache occupancy channel and its real world practicality
A Shusterman, Z Avraham, E Croitoru… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Website fingerprinting attacks use statistical analysis on network traffic to compromise user
privacy. The classical attack model used to evaluate website fingerprinting attacks assumes …
privacy. The classical attack model used to evaluate website fingerprinting attacks assumes …
Theory and practice of finding eviction sets
Many micro-architectural attacks rely on the capability of an attacker to efficiently find small
eviction sets: groups of virtual addresses that map to the same cache set. This capability has …
eviction sets: groups of virtual addresses that map to the same cache set. This capability has …
Mi6: Secure enclaves in a speculative out-of-order processor
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …