Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

W Wang, G Chen, X Pan, Y Zhang, XF Wang… - Proceedings of the …, 2017 - dl.acm.org
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …

Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures

M Yan, CW Fletcher, J Torrellas - 29th USENIX Security Symposium …, 2020 - usenix.org
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …

Netspectre: Read arbitrary memory over network

M Schwarz, M Schwarzl, M Lipp, J Masters… - … Security–ESORICS 2019 …, 2019 - Springer
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …

{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management

A Tang, S Sethumadhavan, S Stolfo - 26th USENIX Security Symposium …, 2017 - usenix.org
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

Strong and efficient cache {Side-Channel} protection using hardware transactional memory

D Gruss, J Lettner, F Schuster, O Ohrimenko… - 26th USENIX Security …, 2017 - usenix.org
Cache-based side-channel attacks are a serious problem in multi-tenant environments, for
example, modern cloud data centers. We address this problem with Cloak, a new technique …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …

Truspy: Cache side-channel information leakage from the secure world on arm devices

N Zhang, K Sun, D Shands, W Lou… - Cryptology ePrint Archive, 2016 - eprint.iacr.org
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …

{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses

A Shusterman, A Agarwal, S O'Connell… - 30th USENIX Security …, 2021 - usenix.org
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Page 1
This paper is included in the Proceedings of the 30th USENIX Security Symposium. August …