Since the disclosure of Spectre, extensive research has been conducted on both new attacks, attack variants, and mitigations. However, most research focuses on x86 CPUs, with only very few insights on ARM CPUs, despite their huge market share. In this paper, we focus on the ARMv8-based Apple CPUs and demonstrate a reliable Spectre attack. For this, we solve several challenges specific to Apple CPUs and their operating system. We systematically evaluate alternative high-resolution timing primitives, as timers used for microarchitectural attacks on other ARM CPUs are unavailable. As cache-maintenance instructions are ineffective, we demonstrate a reliable eviction-set generation from an unprivileged application. Based on these building blocks...
Large-scale attacks on networked computers are typi-cally used to create zombie armies for propagati...
Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understandin...
The processor flaws used in the Spectre and Meltdown attacks have had uncharacteristically large med...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution vulnera...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Speculative attacks are still an active threat today that, even if initially focused on the x86 plat...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Large-scale attacks on networked computers are typi-cally used to create zombie armies for propagati...
Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understandin...
The processor flaws used in the Spectre and Meltdown attacks have had uncharacteristically large med...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution vulnera...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Speculative attacks are still an active threat today that, even if initially focused on the x86 plat...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Modern processors use architecture like caches, branch predictors, and speculative execution in orde...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Large-scale attacks on networked computers are typi-cally used to create zombie armies for propagati...
Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understandin...
The processor flaws used in the Spectre and Meltdown attacks have had uncharacteristically large med...