Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
Spectre returns! speculation attacks using the return stack buffer
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …
modern microprocessors, to allow the exfiltration of sensitive data across protection …
Prochlo: Strong privacy for analytics in the crowd
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
To stop side channel attacks on CPU caches that have allowed attackers to leak secret
information and break basic security mechanisms, the security community has developed a …
information and break basic security mechanisms, the security community has developed a …
Container security: Issues, challenges, and the road ahead
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …
microservice architecture support. The value of the container market is expected to reach 2.7 …
Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
Sanctum: Minimal hardware extensions for strong software isolation
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …
strong provable isolation of software modules running concurrently and sharing resources …
Branchscope: A new side-channel attack on directional branch predictor
We present BranchScope-a new side-channel attack where the attacker infers the direction
of an arbitrary conditional branch instruction in a victim program by manipulating the shared …
of an arbitrary conditional branch instruction in a victim program by manipulating the shared …
SDTE: A secure blockchain-based data trading ecosystem
Data, a key asset in our data-driven economy, has fueled the emergence of a new data
trading industry. However, there are a number of limitations in conventional data trading …
trading industry. However, there are a number of limitations in conventional data trading …