Firecracker: Lightweight virtualization for serverless applications

A Agache, M Brooker, A Iordache, A Liguori… - … USENIX symposium on …, 2020 - usenix.org
Serverless containers and functions are widely used for deploying and managing software
in the cloud. Their popularity is due to reduced cost of operations, improved utilization of …

LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

Fallout: Leaking data on meltdown-resistant cpus

C Canella, D Genkin, L Giner, D Gruss, M Lipp… - Proceedings of the …, 2019 - dl.acm.org
Meltdown and Spectre enable arbitrary data leakage from memory via various side
channels. Short-term software mitigations for Meltdown are only a temporary solution with a …

Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks

S Hong, P Frigo, Y Kaya, C Giuffrida… - 28th USENIX Security …, 2019 - usenix.org
Deep neural networks (DNNs) have been shown to tolerate" brain damage": cumulative
changes to the network's parameters (eg, pruning, numerical perturbations) typically result in …

WRITE+ SYNC: software cache write covert channels exploiting memory-disk synchronization

C Chen, J Cui, G Qu, J Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …

Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure

Y Baseri, V Chouhan, A Ghorbani - arxiv preprint arxiv:2404.10659, 2024 - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

Academic procrastination precedes problematic mobile phone use in Chinese adolescents: A longitudinal mediation model of distraction cognitions

W Hong, RD Liu, Y Ding, S Jiang, X Yang, X Sheng - Addictive behaviors, 2021 - Elsevier
Cross-sectional studies have documented a positive association between academic
procrastination and problematic mobile phone use (PMPU). However, the specific predictive …

Store-to-leak forwarding: leaking data on meltdown-resistant CPUs (updated and extended version)

M Schwarz, C Canella, L Giner, D Gruss - arxiv preprint arxiv:1905.05725, 2019 - arxiv.org
Meltdown and Spectre exploit microarchitectural changes the CPU makes during transient
out-of-order execution. Using side-channel techniques, these attacks enable leaking …

{NVLeak}:{Off-Chip}{Side-Channel} Attacks via {Non-Volatile} Memory Systems

Z Wang, M Taram, D Moghimi, S Swanson… - 32nd USENIX Security …, 2023 - usenix.org
We study microarchitectural side-channel attacks and defenses on non-volatile RAM
(NVRAM) DIMMs. In this study, we first perform reverse-engineering of NVRAMs as …

{Side-Channel} Attacks on Optane Persistent Memory

S Liu, S Kanniwadi, M Schwarzl, A Kogler… - 32nd USENIX Security …, 2023 - usenix.org
There is a constant evolution of technology for cloud environments, including the
development of new memory storage technology, such as persistent memory. The newly …