Powspectre: Powering up speculation attacks with tsx-based replay

MHI Chowdhuryy, Z Zhang, F Yao - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Trusted execution environment (TEE) offers data protection against malicious system
software. However, the TEE (eg, Intel SGX) threat model exacerbates information leakage as …

Suit: Secure undervolting with instruction traps

J Juffinger, S Kalinin, D Gruss, F Mueller - Proceedings of the 29th ACM …, 2024 - dl.acm.org
Modern CPUs dynamically scale voltage and frequency for efficiency. However, too low
voltages can result in security-critical errors. Hence, vendors use a generous safety margin …

This is how you lose the transient execution war

A Randal - arXiv preprint arXiv:2309.03376, 2023 - arxiv.org
A new class of vulnerabilities related to speculative and out-of-order execution, fault-
injection, and microarchitectural side channels rose to attention in 2018. The techniques …

Secret Spilling Drive: Leaking User Behavior through SSD Contention

J Juffinger, F Rauscher… - Network and …, 2025 - graz.elsevierpure.com
Covert channels and side channels bypass architectural security boundaries. Numerous
works have studied covert channels and side channels in software and hardware. Thus …

A Systematic Evaluation of Novel and Existing Cache Side Channels

F Rauscher, C Fiedler, A Kogler… - … and Distributed System …, 2025 - graz.elsevierpure.com
CPU caches are among the most widely studied side-channel targets, with Prime+ Probe
and Flush+ Reload being the most prominent techniques. These generic cache attack …

Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments

OL Gonidec, MM Real, G Bouffard… - arXiv preprint arXiv …, 2024 - arxiv.org
Over the past few years, several research groups have introduced innovative hardware
designs for Trusted Execution Environments (TEEs), aiming to secure applications against …

Acoustic Side-Channel Attacks on a Computer Mouse

M Conti, M Duroyon, G Orazi, G Tsudik - International Conference on …, 2024 - Springer
Abstract Acoustic Side-Channel Attacks (ASCAs) extract sensitive information by using
audio emitted from a computing devices and their peripherals. Attacks targeting keyboards …

Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors

N Mishra, TL Dutta, S Shukla… - … Security and Trust …, 2024 - ieeexplore.ieee.org
Energy consumption trends from reporting interfaces like Running Average Power Limit
(RAPL) can be leveraged by remote adversaries to mount software counterparts of power …

Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks

S Shen, C Jin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Garbled circuits (GC) are a secure multiparty computation protocol that enables two parties
to jointly compute a function using their private data without revealing it to each other. While …

Exploiting Physical Side-Channel Information for Offensive and Defensive Ends

S Liang - 2024 - open.clemson.edu
Side-channel information consists of side effects of computation that range from
microarchitectural to physical phenomena. Empirical studies have demonstrated the …