{DeepHammer}: Depleting the intelligence of deep neural networks through targeted chain of bit flips

F Yao, AS Rakin, D Fan - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Security of machine learning is increasingly becoming a major concern due to the
ubiquitous deployment of deep learning in many security-sensitive domains. Many prior …

Powspectre: Powering up speculation attacks with tsx-based replay

MHI Chowdhuryy, Z Zhang, F Yao - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Trusted execution environment (TEE) offers data protection against malicious system
software. However, the TEE (eg, Intel SGX) threat model exacerbates information leakage as …

A survey on cache timing channel attacks for multicore processors

J Kaur, S Das - Journal of Hardware and Systems Security, 2021 - Springer
Cache timing channel attacks has attained a lot of attention in the last decade. These attacks
exploits the timing channel created by the significant time gap between cache and main …

Leaking secrets through modern branch predictors in the speculative world

MHI Chowdhuryy, F Yao - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Transient execution attacks that exploit speculation have raised significant concerns in
computer systems. Typically, branch predictors are leveraged to trigger mis-speculation in …

Cotsknight: Practical defense against cache timing channel attacks using cache monitoring and partitioning technologies

F Yao, H Fang, M Doroslovački… - … Oriented Security and …, 2019 - ieeexplore.ieee.org
Recent studies have shown how adversaries can exploit hardware cache structures to
launch information leakage-based attacks. Among these attacks, timing channels are …

[PDF][PDF] Ceviche: Capability-Enhanced Secure Virtualization of Caches

A Kalita, Y Yang, AK Murali… - 2025 IEEE Symposium on …, 2024 - researchgate.net
Modern systems make extensive use of resource virtualization to achieve high hardware
utilization and minimize the total cost of ownership. However, sharing of physical resources …

MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata

MHI Chowdhuryy, H Zheng… - 2024 ACM/IEEE 51st …, 2024 - ieeexplore.ieee.org
Microarchitectural side channels raise severe security concerns. Recent studies indicate that
microarchitecture security should be examined holistically (rather than separately) in …

WRITE+ SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization

C Chen, J Cui, G Qu, J Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …

Attack directories on Arm big. LITTLE processors

Z Kou, S Sinha, W He, W Zhang - Proceedings of the 41st IEEE/ACM …, 2022 - dl.acm.org
Eviction-based cache side-channel attacks take advantage of inclusive cache hierarchies
and shared cache hardware. Processors with the template ARM big. LITTLE architecture do …