Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs}

H Taneja, J Kim, JJ Xu, S Van Schaik… - 32nd USENIX Security …, 2023 - usenix.org
The drive to create thinner, lighter, and more energy efficient devices has resulted in modern
SoCs being forced to balance a delicate tradeoff between power consumption, heat …

{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels

A Kogler, J Juffinger, L Giner, L Gerlach… - 32nd USENIX Security …, 2023 - usenix.org
Differential Power Analysis (DPA) measures single-bit differences between data values
used in computer systems by statistical analysis of power traces. In this paper, we show that …

Deeptheft: Stealing dnn model architectures through power side channel

Y Gao, H Qiu, Z Zhang, B Wang, H Ma… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as
Machine Learning as a Service (MLaaS) to provide inference services. To steal model …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Phantom: Exploiting decoder-detectable mispredictions

J Wikner, D Trujillo, K Razavi - Proceedings of the 56th Annual IEEE …, 2023 - dl.acm.org
Violating the Von Neumann sequential processing principle at the microarchitectural level is
commonplace to reach high performing CPU hardware—violations are safe as long as …

Frequency throttling side-channel attack

C Liu, A Chakraborty, N Chawla, N Roggel - Proceedings of the 2022 …, 2022 - dl.acm.org
Modern processors dynamically control their operating frequency to optimize resource
utilization, maximize energy savings, and conform to system-defined constraints. If, during …

DVFS frequently leaks secrets: Hertzbleed attacks beyond SIKE, cryptography, and CPU-only data

Y Wang, R Paccagnella, A Wandke… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The recent Hertzbleed disclosure demonstrates how remote-timing analysis can reveal
secret information previously only accessible to local-power analysis. At worst, this …

Showtime: Amplifying arbitrary cpu timing side channels

A Purnal, M Bognar, F Piessens… - Proceedings of the 2023 …, 2023 - dl.acm.org
Microarchitectural attacks typically rely on precise timing sources to uncover short-lived
secret-dependent activity in the processor. In response, many browsers and even CPU …