Sok: Sgx. fail: How stuff gets exposed
S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …
protected from all software running on the machine. As such, numerous works have sought …
Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs}
The drive to create thinner, lighter, and more energy efficient devices has resulted in modern
SoCs being forced to balance a delicate tradeoff between power consumption, heat …
SoCs being forced to balance a delicate tradeoff between power consumption, heat …
{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels
Differential Power Analysis (DPA) measures single-bit differences between data values
used in computer systems by statistical analysis of power traces. In this paper, we show that …
used in computer systems by statistical analysis of power traces. In this paper, we show that …
Deeptheft: Stealing dnn model architectures through power side channel
Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as
Machine Learning as a Service (MLaaS) to provide inference services. To steal model …
Machine Learning as a Service (MLaaS) to provide inference services. To steal model …
A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …
adopt constant-time programming practices. As these can be error-prone, many side …
Phantom: Exploiting decoder-detectable mispredictions
Violating the Von Neumann sequential processing principle at the microarchitectural level is
commonplace to reach high performing CPU hardware—violations are safe as long as …
commonplace to reach high performing CPU hardware—violations are safe as long as …
Frequency throttling side-channel attack
Modern processors dynamically control their operating frequency to optimize resource
utilization, maximize energy savings, and conform to system-defined constraints. If, during …
utilization, maximize energy savings, and conform to system-defined constraints. If, during …
DVFS frequently leaks secrets: Hertzbleed attacks beyond SIKE, cryptography, and CPU-only data
The recent Hertzbleed disclosure demonstrates how remote-timing analysis can reveal
secret information previously only accessible to local-power analysis. At worst, this …
secret information previously only accessible to local-power analysis. At worst, this …
Showtime: Amplifying arbitrary cpu timing side channels
Microarchitectural attacks typically rely on precise timing sources to uncover short-lived
secret-dependent activity in the processor. In response, many browsers and even CPU …
secret-dependent activity in the processor. In response, many browsers and even CPU …