Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017 - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
To stop side channel attacks on CPU caches that have allowed attackers to leak secret
information and break basic security mechanisms, the security community has developed a …
information and break basic security mechanisms, the security community has developed a …
Flush+ Flush: a fast and stealthy cache attack
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
{ARMageddon}: Cache attacks on mobile devices
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …
among the scientific community and powerful techniques to exploit cache side channels …
Cache template attacks: Automating attacks on inclusive {Last-Level} caches
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …
information leakage. However, existing attacks require manual identification of …
{ScatterCache}: thwarting cache attacks via cache set randomization
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …
even in the absence of software bugs. Currently, there are no practical and generic …
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
Cache-based side-channel attacks are a serious problem in multi-tenant environments, for
example, modern cloud data centers. We address this problem with Cloak, a new technique …
example, modern cloud data centers. We address this problem with Cloak, a new technique …
Systematic analysis of randomization-based protected cache architectures
Recent secure cache designs aim to mitigate side-channel attacks by randomizing the
mapping from memory addresses to cache sets. As vendors investigate deployment of these …
mapping from memory addresses to cache sets. As vendors investigate deployment of these …
Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …