Enabling AI in future wireless networks: A data life cycle perspective
Recent years have seen rapid deployment of mobile computing and Internet of Things (IoT)
networks, which can be mostly attributed to the increasing communication and sensing …
networks, which can be mostly attributed to the increasing communication and sensing …
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Page 1
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …
Don't mesh around:{Side-Channel} attacks and mitigations on mesh interconnects
M Dai, R Paccagnella, M Gomez-Garcia… - 31st USENIX Security …, 2022 - usenix.org
This paper studies microarchitectural side-channel attacks and mitigations on the on-chip
mesh interconnect used in modern, server-class Intel processors. We find that, though …
mesh interconnect used in modern, server-class Intel processors. We find that, though …
{BunnyHop}: Exploiting the Instruction Prefetcher
Z Zhang, M Tao, S O'Connell… - 32nd USENIX Security …, 2023 - usenix.org
BunnyHop: Exploiting the Instruction Prefetcher Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA …
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA …
Spook. js: Attacking Chrome strict site isolation via speculative execution
The discovery of the Spectre attack in 2018 has sent shockwaves through the computer
industry, affecting processor vendors, OS providers, programming language developers …
industry, affecting processor vendors, OS providers, programming language developers …
Sok: Can we really detect cache side-channel attacks by monitoring performance counters?
W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …
information leaks, with devastating implications on security. Over the last decade, multiple …
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
The growing security threat of microarchitectural attacks underlines the importance of robust
security sensors and detection mechanisms at the hardware level. While there are studies …
security sensors and detection mechanisms at the hardware level. While there are studies …
Xai-based microarchitectural side-channel analysis for website fingerprinting attacks and defenses
B Gulmezoglu - IEEE transactions on dependable and secure …, 2021 - ieeexplore.ieee.org
Website Fingerprinting attacks aim to track the visited websites in browsers and infer
confidential information about users. Several studies showed that recent advancements in …
confidential information about users. Several studies showed that recent advancements in …
Bending microarchitectural weird machines towards practicality
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …
nominal instruction set architectures and their actual (microarchitectural) implementations …
An exploration of ARM system-level cache and GPU side channels
Advanced RISC Machines (ARM) processors have recently gained market share in both
cloud computing and desktop applications. Meanwhile, ARM devices have shifted to a more …
cloud computing and desktop applications. Meanwhile, ARM devices have shifted to a more …