Enabling AI in future wireless networks: A data life cycle perspective

DC Nguyen, P Cheng, M Ding… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Recent years have seen rapid deployment of mobile computing and Internet of Things (IoT)
networks, which can be mostly attributed to the increasing communication and sensing …

{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses

A Shusterman, A Agarwal, S O'Connell… - 30th USENIX Security …, 2021 - usenix.org
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Page 1
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …

Don't mesh around:{Side-Channel} attacks and mitigations on mesh interconnects

M Dai, R Paccagnella, M Gomez-Garcia… - 31st USENIX Security …, 2022 - usenix.org
This paper studies microarchitectural side-channel attacks and mitigations on the on-chip
mesh interconnect used in modern, server-class Intel processors. We find that, though …

{BunnyHop}: Exploiting the Instruction Prefetcher

Z Zhang, M Tao, S O'Connell… - 32nd USENIX Security …, 2023 - usenix.org
BunnyHop: Exploiting the Instruction Prefetcher Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA …

Spook. js: Attacking Chrome strict site isolation via speculative execution

A Agarwal, S O'Connell, J Kim… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The discovery of the Spectre attack in 2018 has sent shockwaves through the computer
industry, affecting processor vendors, OS providers, programming language developers …

Sok: Can we really detect cache side-channel attacks by monitoring performance counters?

W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …

Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning

B Gulmezoglu, A Moghimi, T Eisenbarth… - arXiv preprint arXiv …, 2019 - arxiv.org
The growing security threat of microarchitectural attacks underlines the importance of robust
security sensors and detection mechanisms at the hardware level. While there are studies …

Xai-based microarchitectural side-channel analysis for website fingerprinting attacks and defenses

B Gulmezoglu - IEEE transactions on dependable and secure …, 2021 - ieeexplore.ieee.org
Website Fingerprinting attacks aim to track the visited websites in browsers and infer
confidential information about users. Several studies showed that recent advancements in …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …

An exploration of ARM system-level cache and GPU side channels

P Cronin, X Gao, H Wang, C Cotton - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Advanced RISC Machines (ARM) processors have recently gained market share in both
cloud computing and desktop applications. Meanwhile, ARM devices have shifted to a more …