Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

A Container Security Survey: Exploits, Attacks, and Defenses

O Jarkas, R Ko, N Dong, R Mahmud - ACM Computing Surveys, 2025 - dl.acm.org
Containerization significantly boosts cloud computing efficiency by reducing resource
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …

Täkō: A polymorphic cache hierarchy for general-purpose optimization of data movement

BC Schwedock, P Yoovidhya, J Seibert… - Proceedings of the 49th …, 2022 - dl.acm.org
Current systems hide data movement from software behind the load-store interface.
Software's inability to observe and respond to data movement is the root cause of many …

Processor security: Detecting microarchitectural attacks via count-min sketches

K Arıkan, A Palumbo, L Cassano… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
The continuous quest for performance pushed processors to incorporate elements such as
multiple cores, caches, acceleration units, or speculative execution that make systems very …

Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks

AA Ahmed, MK Hasan, A Alqahtani… - Tsinghua Science …, 2024 - ieeexplore.ieee.org
Mobile devices within Fifth Generation (5G) networks, typically equipped with Android
systems, serve as a bridge to connect digital gadgets such as global positioning system …

Toward an Optimal Countermeasure for Cache Side-Channel Attacks

N Shrivastava, SR Sarangi - IEEE Embedded Systems Letters, 2022 - ieeexplore.ieee.org
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and
the defender with respect to cache-based side-channel attacks. We have seen a slew of …

Enhanced obfuscation for software protection in autonomous vehicular cloud computing platforms

M Hataba, A Sherif, R Elkhouly - IEEE Access, 2022 - ieeexplore.ieee.org
Nowadays, sensors, communications connections, and more powerful computing
capabilities are added to automobiles, making them more intelligent. The primary goal was …

Extending the classical side-channel analysis framework to access-driven cache attacks

P Guo, Y Yan, F Zhang, C Zhu, L Zhang, Z Dai - Computers & Security, 2023 - Elsevier
Cryptographic devices are vulnerable to side-channel attacks, which have attracted broad
attention in the hardware security field. The side-channel analysis framework proposed at …

Uclod: Small clock delays to mitigate remote power analysis attacks

D Jayasinghe, A Ignjatovic, S Parameswaran - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents UCloD, a novel random clock delay-based robust and scalable
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …

WRITE+ SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization

C Chen, J Cui, G Qu, J Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …