ZombieLoad: Cross-privilege-boundary data sampling

M Schwarz, M Lipp, D Moghimi, J Van Bulck… - Proceedings of the …, 2019 - dl.acm.org
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

Netspectre: Read arbitrary memory over network

M Schwarz, M Schwarzl, M Lipp, J Masters… - … Security–ESORICS 2019 …, 2019 - Springer
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …

A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes

J Van Bulck, D Oswald, E Marin, A Aldoseri… - Proceedings of the …, 2019 - dl.acm.org
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …

Retrofitting fine grain isolation in the Firefox renderer

S Narayan, C Disselkoen, T Garfinkel, N Froyd… - 29th USENIX Security …, 2020 - usenix.org
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …

Medusa: Microarchitectural data leakage via automated attack synthesis

D Moghimi, M Lipp, B Sunar, M Schwarz - 29th USENIX Security …, 2020 - usenix.org
In May 2019, a new class of transient execution attack based on Meltdown called
microarchitectural data sampling (MDS), was disclosed. MDS enables adversaries to leak …

KASLR: Break it, fix it, repeat

C Canella, M Schwarz, M Haubenwallner… - Proceedings of the 15th …, 2020 - dl.acm.org
In this paper, we analyze the hardware-based Meltdown mitigations in recent Intel
microarchitectures, revealing that illegally accessed data is only zeroed out. Hence, while …

Precise and scalable detection of double-fetch bugs in OS kernels

M Xu, C Qian, K Lu, M Backes… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
During system call execution, it is common for operating system kernels to read userspace
memory multiple times (multi-reads). A critical bug may exist if the fetched userspace …

Warpattack: bypassing cfi through compiler-introduced double-fetches

J Xu, L Di Bartolomeo, F Toffalini… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Code-reuse attacks are dangerous threats that attracted the attention of the security
community for years. These attacks aim at corrupting important control-flow transfers for …