作者
Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
发表日期
2020/2/19
研讨会论文
The 29th USENIX Security Symposium (USENIX Security 2020)
简介
The adversarial model presented by trusted execution environments (TEEs) has prompted researchers to investigate unusual attack vectors. One particularly powerful class of controlled-channel attacks abuses page-table modifications to reliably track enclave memory accesses at a page-level granularity. In contrast to noisy microarchitectural timing leakage, this line of deterministic controlled-channel attacks abuses indispensable architectural interfaces and hence cannot be mitigated by tweaking microarchitectural resources.
引用总数
20202021202220232024914122510
学术搜索中的文章
D Moghimi, J Van Bulck, N Heninger, F Piessens… - 29th USENIX security symposium (USENIX security 20), 2020