Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution

J Van Bulck, M Minkin, O Weisse, D Genkin… - 27th USENIX Security …, 2018 - usenix.org
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …

ZombieLoad: Cross-privilege-boundary data sampling

M Schwarz, M Lipp, D Moghimi, J Van Bulck… - Proceedings of the …, 2019 - dl.acm.org
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …

A survey of Intel SGX and its applications

W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo… - Frontiers of Computer …, 2021 - Springer
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …

A systematic evaluation of transient execution attacks and defenses

C Canella, J Van Bulck, M Schwarz, M Lipp… - 28th USENIX Security …, 2019 - usenix.org
Research on transient execution attacks including Spectre and Meltdown showed that
exception or branch misprediction events might leave secret-dependent traces in the CPU's …

Spectre returns! speculation attacks using the return stack buffer

EM Koruyeh, KN Khasawneh, C Song… - 12th USENIX Workshop …, 2018 - usenix.org
The recent Spectre attacks exploit speculative execution, a pervasively used feature of
modern microprocessors, to allow the exfiltration of sensitive data across protection …

Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

ret2spec: Speculative execution using return stack buffers

G Maisuradze, C Rossow - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Speculative execution is an optimization technique that has been part of CPUs for over a
decade. It predicts the outcome and target of branch instructions to avoid stalling the …

Netspectre: Read arbitrary memory over network

M Schwarz, M Schwarzl, M Lipp, J Masters… - … Security–ESORICS 2019 …, 2019 - Springer
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …

Low latency privacy preserving inference

A Brutzkus, R Gilad-Bachrach… - … Conference on Machine …, 2019 - proceedings.mlr.press
When applying machine learning to sensitive data, one has to find a balance between
accuracy, information security, and computational-complexity. Recent studies combined …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …