Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …
Netspectre: Read arbitrary memory over network
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …
hardware-software energy management mechanisms on modern commodity devices. Most …
{ScatterCache}: thwarting cache attacks via cache set randomization
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …
even in the absence of software bugs. Currently, there are no practical and generic …
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
Cache-based side-channel attacks are a serious problem in multi-tenant environments, for
example, modern cloud data centers. We address this problem with Cloak, a new technique …
example, modern cloud data centers. We address this problem with Cloak, a new technique …
A survey of side-channel attacks on caches and countermeasures
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …
trustworthiness are key considerations in designing computing devices. A vast majority of …
Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Page 1
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …