Showtime: Amplifying arbitrary cpu timing side channels

A Purnal, M Bognar, F Piessens… - Proceedings of the 2023 …, 2023 - dl.acm.org
Microarchitectural attacks typically rely on precise timing sources to uncover short-lived
secret-dependent activity in the processor. In response, many browsers and even CPU …

Leaky way: a conflict-based cache covert channel bypassing set associativity

Y Guo, X Xin, Y Zhang, J Yang - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
Modern * 86 processors feature many prefetch instructions that developers can use to
enhance performance. However, with some prefetch instructions, users can more directly …

Hacky racers: Exploiting instruction-level parallelism to generate stealthy fine-grained timers

H Xiao, S Ainsworth - Proceedings of the 28th ACM International …, 2023 - dl.acm.org
Side-channel attacks pose serious threats to many security models, especially sandbox-
based browsers. While transient-execution side channels in out-of-order processors have …

Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms

T Tiemann, Z Weissman, T Eisenbarth… - Security of FPGA …, 2023 - Springer
After years of development, FPGAs finally made an appearance on multi-tenant cloud
servers in the late 2010s. Research in micro-architectural attacks has uncovered a variety of …

IOTLB-SC: An accelerator-independent leakage source in modern cloud systems

T Tiemann, Z Weissman, T Eisenbarth… - Proceedings of the 2023 …, 2023 - dl.acm.org
Hardware peripherals such as GPUs and FPGAs are commonly available in server-grade
computing to accelerate specific compute tasks, from database queries to machine learning …

Space-Hard Obfuscation against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-based Blockchains

Y Shi, Y Li, T Luo, X Jiang, B Du… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In cloud computing environments, virtual machines (VMs) running on cloud servers are
vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory …

Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets

Z Li, Z Xue, W Song - … Conference on Information Security and Cryptology, 2023 - Springer
Cache side-channel attacks have been widely utilized as an intermediate step in some
comprehensive attacks. Eviction sets, especially the minimal eviction sets, are essential …

Eviction Set Construction Can Be Faster and Victim Interference Less in Cache Side-channel Attacks

Z Li, W Song - 2024 IEEE 7th Advanced Information …, 2024 - ieeexplore.ieee.org
Obtaining proper eviction sets is crucial for the success of conflict-based cache side-channel
attacks. A minimal eviction set contains just enough addresses mapped to the target cache …

Cache Side Channel Attacks on Modern Processors

Y Guo - 2024 - d-scholarship.pitt.edu
Modern CPUs feature many microarchitectural structures shared among users. Although
such resource sharing offers performance benefits, it also creates opportunities for side …

[PDF][PDF] Microarchitectural Vulnerabilities in Heterogeneous Computing and Cloud Systems

Z Weissman - 2024 - digital.wpi.edu
This dissertation brings together some of the defining trends of early 21st century computing—
cloud computing, heterogeneous computing, and the increasingly complex …