Are we there yet? timing and floating-point attacks on differential privacy systems

J Jin, E McMurtry, BIP Rubinstein… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Differential privacy is a de facto privacy framework that has seen adoption in practice via a
number of mature software platforms. Implementation of differentially private (DP) …

{Side-Channel} Attacks on Optane Persistent Memory

S Liu, S Kanniwadi, M Schwarzl, A Kogler… - 32nd USENIX Security …, 2023 - usenix.org
There is a constant evolution of technology for cloud environments, including the
development of new memory storage technology, such as persistent memory. The newly …

Cookie crumbles: breaking and fixing web session integrity

M Squarcina, P Adão, L Veronese… - 32nd USENIX Security …, 2023 - usenix.org
Cookies have a long history of vulnerabilities targeting their confidentiality and integrity. To
address these issues, new mechanisms have been proposed and implemented in browsers …

Sok: Exploring current and future research directions on xs-leaks through an extended formal model

T Van Goethem, G Franken, I Sanchez-Rola… - Proceedings of the …, 2022 - dl.acm.org
A web visit typically consists of the browser rendering a dynamically generated response
that is specifically tailored to the user. This generation of responses based on the currently …

Robust and scalable process isolation against spectre in the cloud

M Schwarzl, P Borrello, A Kogler, K Varda… - … on Research in …, 2022 - Springer
In the quest for efficiency and performance, edge-computing providers replace process
isolation with sandboxes, to support a high number of tenants per machine. While secure …

Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers

L Knittel, C Mainka, M Niemietz, DT Noß… - Proceedings of the 2021 …, 2021 - dl.acm.org
Cross-Site Leaks (XS-Leaks) describe a client-side bug that allows an attacker to collect
side-channel information from a cross-origin HTTP resource. They are a significant threat to …

Targeted deanonymization via the cache side channel: Attacks and defenses

M Zaheri, Y Oren, R Curtmola - 31st USENIX Security Symposium …, 2022 - usenix.org
Targeted deanonymization attacks let a malicious website discover whether a website visitor
bears a certain public identifier, such as an email address or a Twitter handle. These attacks …

Remote memory-deduplication attacks

M Schwarzl, E Kraft, M Lipp, D Gruss - arXiv preprint arXiv:2111.08553, 2021 - arxiv.org
Memory utilization can be reduced by merging identical memory blocks into copy-on-write
mappings. Previous work showed that this so-called memory deduplication can be exploited …

Practical timing side-channel attacks on memory compression

M Schwarzl, P Borrello, G Saileshwar… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Compression algorithms have side channels due to their data-dependent operations. So far,
only the compression-ratio side channel was exploited, eg, the compressed data size. In this …

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs

F Rauscher, D Gruss - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Interrupts are fundamental for inter-process and cross-core communication in modern
systems. Controlling these communication mechanisms historically requires switches into …