A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
Adversarial interference and its mitigations in privacy-preserving collaborative machine learning
Despite the rapid increase of data available to train machine-learning algorithms in many
domains, several applications suffer from a paucity of representative and diverse data. The …
domains, several applications suffer from a paucity of representative and diverse data. The …
When the curious abandon honesty: Federated learning is not private
In federated learning (FL), data does not leave personal devices when they are jointly
training a machine learning model. Instead, these devices share gradients, parameters, or …
training a machine learning model. Instead, these devices share gradients, parameters, or …
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …
appealing research subject for a wide range of computer systems, from low-end embedded …
Prime+ Scope: Overcoming the observer effect for high-precision cache contention attacks
Modern processors expose software to information leakage through shared
microarchitectural state. One of the most severe leakage channels is cache contention …
microarchitectural state. One of the most severe leakage channels is cache contention …
{MIRAGE}: Mitigating {Conflict-Based} Cache Attacks with a Practical {Fully-Associative} Design
G Saileshwar, M Qureshi - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Shared caches in processors are vulnerable to conflict-based side-channel attacks, whereby
an attacker can monitor the access pattern of a victim by evicting victim cache lines using …
an attacker can monitor the access pattern of a victim by evicting victim cache lines using …
Systematic analysis of randomization-based protected cache architectures
Recent secure cache designs aim to mitigate side-channel attacks by randomizing the
mapping from memory addresses to cache sets. As vendors investigate deployment of these …
mapping from memory addresses to cache sets. As vendors investigate deployment of these …
{NVLeak}:{Off-Chip}{Side-Channel} Attacks via {Non-Volatile} Memory Systems
We study microarchitectural side-channel attacks and defenses on non-volatile RAM
(NVRAM) DIMMs. In this study, we first perform reverse-engineering of NVRAMs as …
(NVRAM) DIMMs. In this study, we first perform reverse-engineering of NVRAMs as …
{Side-Channel} Attacks on Optane Persistent Memory
There is a constant evolution of technology for cloud environments, including the
development of new memory storage technology, such as persistent memory. The newly …
development of new memory storage technology, such as persistent memory. The newly …
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …