© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities shows that current processors exceed our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed fundamental design flaws in CPU pipeline behavior and exception handling logic, urging the research community to systematically study attack surface from microarchitectural interactions. We present Nemesis, a previously overlooked side-channel attack vector that abuses the CPU’s interrupt mechanism to leak microarchitectural instruction timings from enclaved execution environments such as Intel SGX, Sancus, and TrustLite. At its core, Nemesis abuses the same subtle microarchitectural behavior that enables Meltdown, i...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security im...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
© 2017 ACM. Protected module architectures such as Intel SGX hold the promise of protecting sensitiv...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security im...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
© 2017 ACM. Protected module architectures such as Intel SGX hold the promise of protecting sensitiv...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Over the past decades, the major objectives of computer design have been to improve performance and ...