A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

{RELOAD+ REFRESH}: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks

S Briongos, P Malagón, JM Moya… - 29th USENIX Security …, 2020 - usenix.org
Caches have become the prime method for unintended information extraction across logical
isolation boundaries. They are widely available on all major CPU platforms and, as a side …

Microwalk: A framework for finding side channels in binaries

J Wichelmann, A Moghimi, T Eisenbarth… - Proceedings of the 34th …, 2018 - dl.acm.org
Microarchitectural side channels expose unprotected software to information leakage
attacks where a software adversary is able to track runtime behavior of a benign process …

{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries

S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …

Big Numbers-Big Troubles: Systematically Analyzing Nonce Leakage in ({EC) DSA} Implementations

S Weiser, D Schrammel, L Bodner… - 29th USENIX Security …, 2020 - usenix.org
Side-channel attacks exploiting (EC) DSA nonce leakage easily lead to full key recovery.
Although (EC) DSA implementations have already been hardened against side-channel …

{AutoLock}: Why cache attacks on {ARM} are harder than you think

M Green, L Rodrigues-Lima, A Zankl… - 26th USENIX Security …, 2017 - usenix.org
Attacks on the microarchitecture of modern processors have become a practical threat to
security and privacy in desktop and cloud computing. Recently, cache attacks have …

SPIDER: Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction

F Yan, R Wu, L Zhang, Y Cao - Tsinghua Science and …, 2022 - ieeexplore.ieee.org
Side-channel attacks allow adversaries to infer sensitive information, such as cryptographic
keys or private user data, by monitoring unintentional information leaks of running programs …

Side-channel attacks in the internet of things: threats and challenges

A Zankl, H Seuschek, G Irazoqui… - Research anthology on …, 2021 - igi-global.com
Abstract The Internet of Things (IoT) rapidly closes the gap between the virtual and the
physical world. As more and more information is processed through this expanding network …

Cacheshield: Protecting legacy processes against cache attacks

S Briongos, G Irazoqui, P Malagón… - arXiv preprint arXiv …, 2017 - arxiv.org
Cache attacks pose a threat to any code whose execution flow or memory accesses depend
on sensitive information. Especially in public clouds, where caches are shared across …