Over the past few years, the high-end CPU market is undergoing a transformational change. Moving away from using x86 as the sole architecture for high performance devices, we have …
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures. Specifically, we systematically investigate the performance penalty and security properties of …
W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential information leaks, with devastating implications on security. Over the last decade, multiple …
Microarchitectural attacks typically rely on precise timing sources to uncover short-lived secret-dependent activity in the processor. In response, many browsers and even CPU …
In the quest for efficiency and performance, edge-computing providers replace process isolation with sandboxes, to support a high number of tenants per machine. While secure …
The scale and frequency of password database compromises has led to widespread and persistent credential stuffing attacks, in which attackers attempt to use credentials leaked …
H Xiao, S Ainsworth - Proceedings of the 28th ACM International …, 2023 - dl.acm.org
Side-channel attacks pose serious threats to many security models, especially sandbox- based browsers. While transient-execution side channels in out-of-order processors have …
Compression algorithms have side channels due to their data-dependent operations. So far, only the compression-ratio side channel was exploited, eg, the compressed data size. In this …
Browser fingerprinting is often associated with cross-site user tracking, a practice that many browsers (eg, Safari, Brave, Edge, Firefox, and Chrome) want to block. However, less is …