Hacky racers: Exploiting instruction-level parallelism to generate stealthy fine-grained timers

H Xiao, S Ainsworth - Proceedings of the 28th ACM International …, 2023 - dl.acm.org
Side-channel attacks pose serious threats to many security models, especially sandbox-
based browsers. While transient-execution side channels in out-of-order processors have …

Branch different-spectre attacks on apple silicon

L Hetterich, M Schwarz - … Conference on Detection of Intrusions and …, 2022 - Springer
Since the disclosure of Spectre, extensive research has been conducted on both new
attacks, attack variants, and mitigations. However, most research focuses on× 86 CPUs, with …

SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?

W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …

CPU port contention without SMT

T Rokicki, C Maurice, M Schwarz - European Symposium on Research in …, 2022 - Springer
CPU port contention has been used in the last years as a stateless side channel to perform
side-channel attacks and transient execution attacks. One drawback of this channel is that it …

Friend or foe inside? exploring in-process isolation to maintain memory safety for unsafe rust

M Gülmez, T Nyman, C Baumann… - 2023 IEEE Secure …, 2023 - ieeexplore.ieee.org
Rust is a popular memory-safe systems programming language. In order to interact with
hardware or call into non-Rust libraries, Rust provides unsafe language features that shift …

These aren't the caches you're looking for: Stochastic channels on randomized caches

T Verma, A Anastasopoulos… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Many security attacks utilize cache side-channels to subvert memory security mechanisms.
By exploiting co-resident processes that share the cache, attackers simply monitor and …

Layered Binary Templating: Efficient Detection of Compiler-and Linker-introduced Leakage

M Schwarzl, E Kraft, D Gruss - arXiv preprint arXiv:2208.02093, 2022 - arxiv.org
Cache template attacks demonstrated automated leakage of user input in shared libraries.
However, for large binaries, the runtime is prohibitively high. Other automated approaches …

Browser-based CPU fingerprinting

L Trampert, C Rossow, M Schwarz - European Symposium on Research …, 2022 - Springer
Mounting microarchitectural attacks, such as Spectre or Rowhammer, is possible from
browsers. However, to be realistically exploitable, they require precise knowledge about …

[PDF][PDF] Dynamic Reconfiguration of Hardware-Vulnerability Mitigations in the Linux Kernel

H Hofmeier - 2022 - sys.cs.fau.de
Providing secure systems, for example, in computing centers, is an essential task of service
providers. Vulnerabilities threatening secure execution are not only located in defective …

[PDF][PDF] Optimising memory usage of Kubernetes operators

T Ramlot - 2022 - libstore.ugent.be
Abstract” AnewKubernetesoperatorarchitecture, basedonWebAssembly, canreducethecontrolplanememoryoverhea…
the orchestrator a better fit for low-resource environments while offering a cost-reduction for …