PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

Houdini's escape: Breaking the resource rein of linux control groups

X Gao, Z Gu, Z Li, H Jamjoom, C Wang - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Linux Control Groups, ie, cgroups, are the key building blocks to enable operating-system-
level containerization. The cgroups mechanism partitions processes into hierarchical groups …

Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage

I Giechaskiel, KB Rasmussen… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits
that can be used as hardware accelerators to process highly-sensitive data. Leaking this …

Fingerprinting cloud FPGA infrastructures

S Tian, W Xiong, I Giechaskiel, K Rasmussen… - Proceedings of the …, 2020 - dl.acm.org
In recent years, multiple public cloud FPGA providers have emerged, increasing interest in
FPGA acceleration of cryptographic, bioinformatic, financial, and machine learning …

Alita: Comprehensive performance isolation through bias resource management for public clouds

Q Chen, S Xue, S Zhao, S Chen, Y Wu… - … Conference for High …, 2020 - ieeexplore.ieee.org
The tenants of public cloud platforms share hard-ware resources on the same node,
resulting in the potential for performance interference (or malicious attacks). A tenant is able …

Your noise, my signal: Exploiting switching noise for stealthy data exfiltration from desktop computers

Z Shao, MA Islam, S Ren - Proceedings of the ACM on Measurement …, 2020 - dl.acm.org
Attacks based on power analysis have been long existing and studied, with some recent
works focused on data exfiltration from victim systems without using conventional …

Ready raider one: Exploring the misuse of cloud gaming services

G Liu, D Liu, S Hao, X Gao, K Sun… - Proceedings of the 2022 …, 2022 - dl.acm.org
Cloud gaming has become an emerging computing paradigm in recent years, allowing
computer games to offload complex graphics and logic computation to the cloud. To deliver …

CapSpeaker: Injecting Commands to Voice Assistants via Capacitors

Y Jiang, X Ji, J Zhang, Y Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have exposed that voice assistants can be manipulated by various voice
commands without being noticed, however, existing attacks require a nearby speaker to play …