PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

Website fingerprinting through the cache occupancy channel and its real world practicality

A Shusterman, Z Avraham, E Croitoru… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Website fingerprinting attacks use statistical analysis on network traffic to compromise user
privacy. The classical attack model used to evaluate website fingerprinting attacks assumes …

Hammerscope: Observing dram power consumption using rowhammer

Y Cohen, KS Tharayil, A Haenel, D Genkin… - Proceedings of the …, 2022 - dl.acm.org
The constant reduction in memory cell sizes has increased memory density and reduced
power consumption, but has also affected its reliability. The Rowhammer attack exploits this …

There's always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attack

J Cook, J Drean, J Behrens, M Yan - Proceedings of the 49th Annual …, 2022 - dl.acm.org
Machine learning has made it possible to mount powerful attacks through side channels that
have traditionally been seen as challenging to exploit. However, due to the black-box nature …

Wireless charging power side-channel attacks

AS La Cour, KK Afridi, GE Suh - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
This paper demonstrates that today's wireless charging interface is vulnerable to power side-
channel attacks; a smartphone that charges wirelessly leaks information about its activity to …

Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting

N Matyunin, Y Wang, T Arul, K Kullmann… - Proceedings of the 18th …, 2019 - dl.acm.org
Recent studies have shown that aggregate CPU usage and power consumption traces on
smartphones can leak information about applications running on the system or websites …

An exploration of ARM system-level cache and GPU side channels

P Cronin, X Gao, H Wang, C Cotton - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Advanced RISC Machines (ARM) processors have recently gained market share in both
cloud computing and desktop applications. Meanwhile, ARM devices have shifted to a more …

Your noise, my signal: Exploiting switching noise for stealthy data exfiltration from desktop computers

Z Shao, MA Islam, S Ren - Proceedings of the ACM on Measurement …, 2020 - dl.acm.org
Attacks based on power analysis have been long existing and studied, with some recent
works focused on data exfiltration from victim systems without using conventional …

Targeted deanonymization via the cache side channel: Attacks and defenses

M Zaheri, Y Oren, R Curtmola - 31st USENIX Security Symposium …, 2022 - usenix.org
Targeted deanonymization attacks let a malicious website discover whether a website visitor
bears a certain public identifier, such as an email address or a Twitter handle. These attacks …

Red alert for power leakage: Exploiting intel rapl-induced side channels

Z Zhang, S Liang, F Yao, X Gao - Proceedings of the 2021 ACM Asia …, 2021 - dl.acm.org
RAPL (Running Average Power Limit) is a hardware feature introduced by Intel to facilitate
power management. Even though RAPL and its supporting software interfaces can benefit …