Sok: Sgx. fail: How stuff gets exposed
S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …
protected from all software running on the machine. As such, numerous works have sought …
[HTML][HTML] WebAssembly and Security: a review
WebAssembly is revolutionizing the approach to develo** modern applications. Although
this technology was born to create portable and performant modules in web browsers …
this technology was born to create portable and performant modules in web browsers …
({M) WAIT} for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
In the last years, there has been a rapid increase in microarchitectural attacks, exploiting
side effects of various parts of the CPU. Most of them have in common that they rely on …
side effects of various parts of the CPU. Most of them have in common that they rely on …
Write me and I'll tell you secrets–write-after-write effects on Intel CPUs
There is a long history of side channels in the memory hierarchy of modern CPUs.
Especially the cache side channel is widely used in the context of transient execution attacks …
Especially the cache side channel is widely used in the context of transient execution attacks …
A security RISC: microarchitectural attacks on hardware RISC-V CPUs
Microarchitectural attacks threaten the security of computer systems even in the absence of
software vulnerabilities. Such attacks are well explored on x86 and ARM CPUs, with a wide …
software vulnerabilities. Such attacks are well explored on x86 and ARM CPUs, with a wide …
Sysxchg: Refining privilege with adaptive system call filters
We present the design, implementation, and evaluation of SysXCHG: a system call (syscall)
filtering enforcement mechanism that enables programs to run in accordance with the …
filtering enforcement mechanism that enables programs to run in accordance with the …
Branch different-spectre attacks on apple silicon
L Hetterich, M Schwarz - … Conference on Detection of Intrusions and …, 2022 - Springer
Since the disclosure of Spectre, extensive research has been conducted on both new
attacks, attack variants, and mitigations. However, most research focuses on× 86 CPUs, with …
attacks, attack variants, and mitigations. However, most research focuses on× 86 CPUs, with …
CPU port contention without SMT
CPU port contention has been used in the last years as a stateless side channel to perform
side-channel attacks and transient execution attacks. One drawback of this channel is that it …
side-channel attacks and transient execution attacks. One drawback of this channel is that it …
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)
Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled,
quiescent local environments. Hence, it is unclear whether such attacks are feasible in a …
quiescent local environments. Hence, it is unclear whether such attacks are feasible in a …
SegScope: Probing fine-grained interrupts via architectural footprints
Interrupts are critical hardware resources for OS kernels to schedule processes. As they are
related to system activities, interrupts can be used to mount various side-channel attacks (ie …
related to system activities, interrupts can be used to mount various side-channel attacks (ie …