A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Last-level cache side-channel attacks are practical

F Liu, Y Yarom, Q Ge, G Heiser… - 2015 IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present an effective implementation of the Prime+ Probe side-channel attack against the
last-level cache. We measure the capacity of the covert channel the attack creates and …

Controlled-channel attacks: Deterministic side channels for untrusted operating systems

Y Xu, W Cui, M Peinado - 2015 IEEE Symposium on Security …, 2015 - ieeexplore.ieee.org
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

{ARMageddon}: Cache attacks on mobile devices

M Lipp, D Gruss, R Spreitzer, C Maurice… - 25th USENIX Security …, 2016 - usenix.org
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …

Catalyst: Defeating last-level cache side channel attacks in cloud computing

F Liu, Q Ge, Y Yarom, F Mckeen… - … symposium on high …, 2016 - ieeexplore.ieee.org
Cache side channel attacks are serious threats to multi-tenant public cloud platforms. Past
work showed how secret information in one virtual machine (VM) can be extracted by …

Port contention for fun and profit

AC Aldaya, BB Brumley, S ul Hassan… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Simultaneous Multithreading (SMT) architectures are attractive targets for side-channel
enabled attackers, with their inherently broader attack surface that exposes more per …

CacheBleed: a timing attack on OpenSSL constant-time RSA

Y Yarom, D Genkin, N Heninger - Journal of Cryptographic Engineering, 2017 - Springer
The scatter–gather technique is a commonly implemented approach to prevent cache-based
timing attacks. In this paper, we show that scatter–gather is not constant time. We implement …

Survey of CPU Cache‐Based Side‐Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

C Su, Q Zeng - Security and Communication Networks, 2021 - Wiley Online Library
Privacy protection is an essential part of information security. The use of shared resources
demands more privacy and security protection, especially in cloud computing environments …

ZeroTrace: Oblivious memory primitives from Intel SGX

S Sasy, S Gorbunov, CW Fletcher - Cryptology ePrint Archive, 2017 - eprint.iacr.org
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …