Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

[HTML][HTML] WebAssembly and Security: a review

G Perrone, SP Romano - Computer Science Review, 2025 - Elsevier
WebAssembly is revolutionizing the approach to develo** modern applications. Although
this technology was born to create portable and performant modules in web browsers …

({M) WAIT} for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

R Zhang, T Kim, D Weber, M Schwarz - 32nd USENIX Security …, 2023 - usenix.org
In the last years, there has been a rapid increase in microarchitectural attacks, exploiting
side effects of various parts of the CPU. Most of them have in common that they rely on …

Write me and I'll tell you secrets–write-after-write effects on Intel CPUs

JP Thoma, T Güneysu - … of the 25th International Symposium on …, 2022 - dl.acm.org
There is a long history of side channels in the memory hierarchy of modern CPUs.
Especially the cache side channel is widely used in the context of transient execution attacks …

A security RISC: microarchitectural attacks on hardware RISC-V CPUs

L Gerlach, D Weber, R Zhang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Microarchitectural attacks threaten the security of computer systems even in the absence of
software vulnerabilities. Such attacks are well explored on x86 and ARM CPUs, with a wide …

Sysxchg: Refining privilege with adaptive system call filters

AJ Gaidis, V Atlidakis, VP Kemerlis - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
We present the design, implementation, and evaluation of SysXCHG: a system call (syscall)
filtering enforcement mechanism that enables programs to run in accordance with the …

Branch different-spectre attacks on apple silicon

L Hetterich, M Schwarz - … Conference on Detection of Intrusions and …, 2022 - Springer
Since the disclosure of Spectre, extensive research has been conducted on both new
attacks, attack variants, and mitigations. However, most research focuses on× 86 CPUs, with …

CPU port contention without SMT

T Rokicki, C Maurice, M Schwarz - European Symposium on Research in …, 2022 - Springer
CPU port contention has been used in the last years as a stateless side channel to perform
side-channel attacks and transient execution attacks. One drawback of this channel is that it …

Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)

ZN Zhao, A Morrison, CW Fletcher… - arxiv preprint arxiv …, 2024 - arxiv.org
Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled,
quiescent local environments. Hence, it is unclear whether such attacks are feasible in a …

SegScope: Probing fine-grained interrupts via architectural footprints

X Zhang, Z Zhang, Q Shen, W Wang… - … Symposium on High …, 2024 - ieeexplore.ieee.org
Interrupts are critical hardware resources for OS kernels to schedule processes. As they are
related to system activities, interrupts can be used to mount various side-channel attacks (ie …