Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024‏ - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

A survey on various threats and current state of security in android platform

P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019‏ - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …

ZombieLoad: Cross-privilege-boundary data sampling

M Schwarz, M Lipp, D Moghimi, J Van Bulck… - Proceedings of the …, 2019‏ - dl.acm.org
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …

Spectre returns! speculation attacks using the return stack buffer

EM Koruyeh, KN Khasawneh, C Song… - 12th USENIX Workshop …, 2018‏ - usenix.org
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018‏ - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

Drammer: Deterministic rowhammer attacks on mobile platforms

V Van Der Veen, Y Fratantonio, M Lindorfer… - Proceedings of the …, 2016‏ - dl.acm.org
Recent work shows that the Rowhammer hardware bug can be used to craft powerful
attacks and completely subvert a system. However, existing efforts either describe …

Kaslr is dead: long live kaslr

D Gruss, M Lipp, M Schwarz, R Fellner… - … Secure Software and …, 2017‏ - Springer
Modern operating system kernels employ address space layout randomization (ASLR) to
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …

Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR

D Gruss, C Maurice, A Fogh, M Lipp… - Proceedings of the 2016 …, 2016‏ - dl.acm.org
Modern operating systems use hardware support to protect against control-flow hijacking
attacks such as code-injection attacks. Typically, write access to executable pages is …

Flip feng shui: Hammering a needle in the software stack

K Razavi, B Gras, E Bosman, B Preneel… - 25th USENIX Security …, 2016‏ - usenix.org
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …

The spy in the sandbox: Practical cache attacks in javascript and their implications

Y Oren, VP Kemerlis, S Sethumadhavan… - Proceedings of the …, 2015‏ - dl.acm.org
We present a micro-architectural side-channel attack that runs entirely in the browser. In
contrast to previous work in this genre, our attack does not require the attacker to install …