Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020 - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …

WHISPER: A tool for run-time detection of side-channel attacks

M Mushtaq, J Bricq, MK Bhatti, A Akram… - IEEE …, 2020 - ieeexplore.ieee.org
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …

Hardware performance counter-based fine-grained malware detection

SP Kadiyala, P Jadhav, SK Lam… - ACM Transactions on …, 2020 - dl.acm.org
Detection of malicious programs using hardware-based features has gained prominence
recently. The tamper-resistant hardware metrics prove to be a better security feature than the …

Run-time detection of prime+ probe side-channel attack on AES encryption algorithm

M Mushtaq, A Akram, MK Bhatti… - 2018 Global …, 2018 - ieeexplore.ieee.org
This paper presents a run-time detection mechanism for access-driven cache-based Side-
Channel Attacks (CSCAs) on Intel's× 86 architecture. We demonstrate the detection …

Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks

H Wang, H Sayadi, A Sasan, S Rafatirad… - Proceedings of the …, 2020 - dl.acm.org
Microarchitectural Side-Channel Attacks (SCAs) have posed serious threats to the security
of modern computing systems. Such attacks exploit side-channel vulnerabilities stemming …

Real time detection of spectre and meltdown attacks using machine learning

BA Ahmad - arxiv preprint arxiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking
confidential information to other processes through side-channel attacks. These …

Machine learning for security: The case of side-channel attack detection at run-time

M Mushtaq, A Akram, MK Bhatti… - 2018 25th IEEE …, 2018 - ieeexplore.ieee.org
This paper presents experimental evaluation and comparative analysis on the use of various
Machine Learning (ML) models for detecting Cache-based Side Channel Attacks (CSCAs) …

Meet the Sherlock Holmes' of side channel leakage: A survey of cache SCA detection techniques

A Akram, M Mushtaq, MK Bhatti, V Lapotre… - IEEE …, 2020 - ieeexplore.ieee.org
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since,
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …

Deep learning based detection for multiple cache side-channel attacks

H Kim, C Hahn, HJ Kim, Y Shin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A cache side-channel attack retrieves victim's sensitive information from a system by
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …