CPU vulnerabilities undermine the security guarantees provided by software- and hardware-security improvements. While the discovery of transient-execution attacks increased the interest in CPU vulnerabilities on a microarchitectural level, architectural CPU vulnerabilities are still understudied. In this paper, we systematically analyze existing CPU vulnerabilities showing that CPUs suffer from vulnerabilities whose root causes match with those in complex software. We show that transient-execution attacks and architectural vulnerabilities often arise from the same type of bug and identify the blank spots. Investigating the blank spots, we focus on architecturally improperly initialized data locations. We discover ÆPIC Leak, the first ...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of compute...
Since Spectre and Meltdown's disclosure in 2018, a new category of attacks has been identified and c...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
<p>Today more than ever before, academia, manufacturers, and hyperscalers acknowledge the majo...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of compute...
Since Spectre and Meltdown's disclosure in 2018, a new category of attacks has been identified and c...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
<p>Today more than ever before, academia, manufacturers, and hyperscalers acknowledge the majo...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...