A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
{ScatterCache}: thwarting cache attacks via cache set randomization
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …
even in the absence of software bugs. Currently, there are no practical and generic …
{RELOAD+ REFRESH}: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Caches have become the prime method for unintended information extraction across logical
isolation boundaries. They are widely available on all major CPU platforms and, as a side …
isolation boundaries. They are widely available on all major CPU platforms and, as a side …
Microwalk: A framework for finding side channels in binaries
Microarchitectural side channels expose unprotected software to information leakage
attacks where a software adversary is able to track runtime behavior of a benign process …
attacks where a software adversary is able to track runtime behavior of a benign process …
{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries
S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …
attacks and should, thus, be protected against them. Countermeasures, however, are often …
Big Numbers-Big Troubles: Systematically Analyzing Nonce Leakage in ({EC) DSA} Implementations
S Weiser, D Schrammel, L Bodner… - 29th USENIX Security …, 2020 - usenix.org
Side-channel attacks exploiting (EC) DSA nonce leakage easily lead to full key recovery.
Although (EC) DSA implementations have already been hardened against side-channel …
Although (EC) DSA implementations have already been hardened against side-channel …
{AutoLock}: Why cache attacks on {ARM} are harder than you think
M Green, L Rodrigues-Lima, A Zankl… - 26th USENIX Security …, 2017 - usenix.org
Attacks on the microarchitecture of modern processors have become a practical threat to
security and privacy in desktop and cloud computing. Recently, cache attacks have …
security and privacy in desktop and cloud computing. Recently, cache attacks have …
SPIDER: Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction
Side-channel attacks allow adversaries to infer sensitive information, such as cryptographic
keys or private user data, by monitoring unintentional information leaks of running programs …
keys or private user data, by monitoring unintentional information leaks of running programs …
Side-channel attacks in the internet of things: threats and challenges
A Zankl, H Seuschek, G Irazoqui… - Research anthology on …, 2021 - igi-global.com
Abstract The Internet of Things (IoT) rapidly closes the gap between the virtual and the
physical world. As more and more information is processed through this expanding network …
physical world. As more and more information is processed through this expanding network …
Cacheshield: Protecting legacy processes against cache attacks
Cache attacks pose a threat to any code whose execution flow or memory accesses depend
on sensitive information. Especially in public clouds, where caches are shared across …
on sensitive information. Especially in public clouds, where caches are shared across …