Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Software grand exposure:{SGX} cache attacks are practical

F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017 - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …

Detecting privileged side-channel attacks in shielded execution with Déjá Vu

S Chen, X Zhang, MK Reiter, Y Zhang - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an
unprivileged program running inside a secure enclave from a privileged attacker who has …

Homealone: Co-residency detection in the cloud via side-channel analysis

Y Zhang, A Juels, A Oprea… - 2011 IEEE symposium on …, 2011 - ieeexplore.ieee.org
Security is a major barrier to enterprise adoption of cloud computing. Physical co-residency
with other tenants poses a particular risk, due to pervasive virtualization in the cloud. Recent …

Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks

L Domnitser, A Jaleel, J Loew… - ACM Transactions on …, 2012 - dl.acm.org
We propose a flexibly-partitioned cache design that either drastically weakens or completely
eliminates cache-based side channel attacks. The proposed Non-Monopolizable (NoMo) …

Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud

Y Zhang, MK Reiter - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
This paper presents the design, implementation and evaluation of a system called Düppel
that enables a tenant virtual machine to defend itself from cache-based side-channel attacks …

A software approach to defeating side channels in last-level caches

Z Zhou, MK Reiter, Y Zhang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
We present a software approach to mitigate access-driven side-channel attacks that
leverage last-level caches (LLCs) shared across cores to leak information between security …

Efficient invisible speculative execution through selective delay and value prediction

C Sakalis, S Kaxiras, A Ros, A Jimborean… - Proceedings of the 46th …, 2019 - dl.acm.org
Speculative execution, the base on which modern high-performance general-purpose CPUs
are built on, has recently been shown to enable a slew of security attacks. All these attacks …

DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - Proceedings of the 35th …, 2019 - dl.acm.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …