Recent CPUs have begun to adopt non-inclusive cache hierarchies for more effective cache utilization. Non-inclusive cache hierarchies have an additional advantage in that they eliminate the vulnerability to cache-based side-channel attacks. In addition, precise timers are often disabled or added with noise to defeat timer-based side-channel attacks. With the combination of such countermeasures, existing cache- and directory-based side-channel attacks can robustly be defeated on commodity systems.In this work, we discover the vulnerability caused by the undocumented interactions between the coherence directories and Intel TSX transactions in latest Intel CPUs with non-inclusive cache hierarchies. Guided by the observation, we propose a high-...
Intel SGX is known to be vulnerable to a class of practical attacks exploiting memory access pattern...
International audienceIn modern computer systems, user processes are isolated from each other by the...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceSide channels and covert channels can give untrusted applications access to th...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Intel SGX is known to be vulnerable to a class of practical attacks exploiting memory access pattern...
International audienceIn modern computer systems, user processes are isolated from each other by the...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Privacy protection is an essential part of information security. The use of shared resources demands...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceSide channels and covert channels can give untrusted applications access to th...
International audienceSide channels and covert channels can give untrusted applications access to th...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Intel SGX is known to be vulnerable to a class of practical attacks exploiting memory access pattern...
International audienceIn modern computer systems, user processes are isolated from each other by the...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...