-
ISCA 2023
-
ISA-Grid: Architecture of Fine-grained Privilege Control for Instructions and Registers
-
Metior: A Comprehensive Model to Evaluate Obfuscating Side-Channel Defense Schemes
-
Doppelganger Loads: A Safe, Complexity-Effective Optimization for Secure Speculation Schemes
-
Pensieve: Microarchitectural Modeling for Security Evaluation
-
All your PC are belong to us: Exploiting Non-control-transfer Instruction BTB Updates for Dynamic PC Extraction
-
-
ASPLOS 2023
-
AfterImage: Leaking Control Flow and Tracking Load Operations via the Hardware Prefetcher
-
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
-
Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes
-
-
S&P 2023
- SQUIP: Exploiting the Scheduler Queue Contention Side Channel
-
MICRO 2022
-
CRONUS: Fault-Isolated, Secure and High-Performance Heterogeneous Computing for Trusted Execution Environments
-
Revisiting Residue Codes for Modern Memories
-
PageORAM: An Efficient DRAM Page Aware ORAM Strategy
-
AQUA: Scalable Rowhammer Mitigation by Quarantining Aggressor Rows at Runtime
-
Leaky Way: A Conflict-Based Cache Covert Channel Bypassing Set Associativity
-
Eager Memory Cryptography in Caches
-
Self-Reinforcing Memoization for Cryptography Calculations in Secure Memory Systems
-
-
ISCA 2022
-
PPMLAC: High Performance Chipset Architecture for Secure Multi-Party Computation
-
INSPIRE: In-Storage Private Information Retrieval via Protocol and Architecture Co-design
-
SoftVN: Efficient Memory Protection via Software-Provided Version Numbers
-
CraterLake: A Hardware Accelerator for Efficient Unbounded Computation on Encrypted Data
-
PS-ORAM: Efficient Crash Consistency Support for Oblivious RAM on NVM
-
MOESI-prime: Preventing Coherence-Induced Hammering in Commodity Workloads
-
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
-
MGX: Near-Zero Overhead Memory Protection for Data-Intensive Accelerators
-
Hydra: Enabling Low-Overhead Mitigation of Row-Hammer at Ultra-Low Thresholds via Hybrid Tracking
-
BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption
-
HPCA 2022
-
Leaky Frontends: Security Vulnerabilities in Processor Frontends
-
Abusing Cache Line Dirty States to Leak Information in Commercial Processors
-
TNPU: Supporting Trusted Execution with Tree-Less Integrity Protection for Neural Processing Unit
-
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor
-
IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM
-
SafeGuard: Reducing the Security Risk from Row-Hammer via Low-Cost Integrity Protection
-
-
ASPLOS 2022
-
CCS 2022
-
S&P 2022
-
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
-
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
-
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
-
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest
-
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
-
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
-
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
-
-
SEC 2022
-
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring
-
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
-
Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker
-
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
-
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
-
Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies
-
SecSMT: Securing SMT Processors against Contention-Based Covert Channels
-
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
-
Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects
-
Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
-
RETBLEED: Arbitrary Speculative Code Execution with Return Instructions
-
Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
-
-
NDSS 2022
-
MICRO 2021
-
ISCA 2021
-
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data
-
I See Dead μops: Leaking Secrets via Intel/AMD Micro-Op Caches
-
TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software
-
Demystifying the System Vulnerability Stack: Transient Fault Effects Across the Layers
-
No-FAT: Architectural Support for Low Overhead Memory Safety Checks
-
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems
-
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
-
ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks
-
-
ASPLOS 2021
-
PIBE: Practical Kernel Control-Flow Hardening with Profile-Guided Indirect Branch Elimination
-
HerQules: Securing Programs via Hardware-Enforced Message Queues
-
Speculative Interference Attacks: Breaking Invisible Speculation Schemes
-
Streamline: A Fast, Flushless Cache Covert-Channel Attack by Enabling Asynchronous Collusion
-
-
HPCA 2021
-
Common Counters: Compressed Encryption Counters for Secure GPU Memory
-
Streamline Ring ORAM Accesses through Spatial and Temporal Optimization
-
New Models for Understanding and Reasoning about Speculative Execution Attacks
-
Heat Behind the Meter: A Hidden Threat of Thermal Attacks in Edge Colocation Data Centers
-
Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery
-
-
CCS 2021
-
SEC 2021
-
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
-
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management
-
Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite
-
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design
-
DOLMA: Securing Speculation with the Principle of Transient Non-Observability
-
Osiris: Automated Discovery of Microarchitectural Side Channels
-
-
S&P 2021
-
NDSS 2021