A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

{AEX-Notify}: Thwarting Precise {Single-Step**} Attacks through Interrupt Awareness for Intel {SGX} Enclaves

S Constable, J Van Bulck, X Cheng, Y **ao… - 32nd USENIX Security …, 2023 - usenix.org
Intel® Software Guard Extensions (Intel® SGX) supports the creation of shielded enclaves
within unprivileged processes. While enclaves are architecturally protected against …

[PDF][PDF] SGAxe: How SGX fails in practice

S Van Schaik, A Kwong, D Genkin, Y Yarom - 2020 - sgaxe.com
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. A significant limitation of SGX is its lack …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

{CopyCat}: Controlled {Instruction-Level} attacks on enclaves

D Moghimi, J Van Bulck, N Heninger… - 29th USENIX security …, 2020 - usenix.org
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …

{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries

S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …

Cache-timing attacks on RSA key generation

AC Aldaya, CP García, LMA Tapia… - Cryptology ePrint …, 2018 - eprint.iacr.org
During the last decade, constant-time cryptographic software has quickly transitioned from
an academic construct to a concrete security requirement for real-world libraries. Most of …

Big numbers-big troubles: Systematically analyzing nonce leakage in ({EC) DSA} implementations

S Weiser, D Schrammel, L Bodner… - 29th USENIX Security …, 2020 - usenix.org
Side-channel attacks exploiting (EC) DSA nonce leakage easily lead to full key recovery.
Although (EC) DSA implementations have already been hardened against side-channel …