Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
A Container Security Survey: Exploits, Attacks, and Defenses
Containerization significantly boosts cloud computing efficiency by reducing resource
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …
Täkō: A polymorphic cache hierarchy for general-purpose optimization of data movement
BC Schwedock, P Yoovidhya, J Seibert… - Proceedings of the 49th …, 2022 - dl.acm.org
Current systems hide data movement from software behind the load-store interface.
Software's inability to observe and respond to data movement is the root cause of many …
Software's inability to observe and respond to data movement is the root cause of many …
Processor security: Detecting microarchitectural attacks via count-min sketches
The continuous quest for performance pushed processors to incorporate elements such as
multiple cores, caches, acceleration units, or speculative execution that make systems very …
multiple cores, caches, acceleration units, or speculative execution that make systems very …
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
Mobile devices within Fifth Generation (5G) networks, typically equipped with Android
systems, serve as a bridge to connect digital gadgets such as global positioning system …
systems, serve as a bridge to connect digital gadgets such as global positioning system …
Toward an Optimal Countermeasure for Cache Side-Channel Attacks
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and
the defender with respect to cache-based side-channel attacks. We have seen a slew of …
the defender with respect to cache-based side-channel attacks. We have seen a slew of …
Enhanced obfuscation for software protection in autonomous vehicular cloud computing platforms
Nowadays, sensors, communications connections, and more powerful computing
capabilities are added to automobiles, making them more intelligent. The primary goal was …
capabilities are added to automobiles, making them more intelligent. The primary goal was …
Extending the classical side-channel analysis framework to access-driven cache attacks
P Guo, Y Yan, F Zhang, C Zhu, L Zhang, Z Dai - Computers & Security, 2023 - Elsevier
Cryptographic devices are vulnerable to side-channel attacks, which have attracted broad
attention in the hardware security field. The side-channel analysis framework proposed at …
attention in the hardware security field. The side-channel analysis framework proposed at …
Uclod: Small clock delays to mitigate remote power analysis attacks
This paper presents UCloD, a novel random clock delay-based robust and scalable
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …
WRITE+ SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …
and security, especially in systems that handle sensitive information like financial …