This webpage contains recent research papers on attacks/mitigations related to Memory Systems
Year
Paper Title
2019
Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World
2018
Theory and Practice of Finding Eviction Sets
2018
Spectre Attacks: Exploiting Speculative Execution
2018
Let's Not Speculate: Discovering and Analyzing Speculative Execution Attacks
2018
A Systematic Evaluation of Transient Execution Attacks and Defenses
2018
Nonblocking Memory Refresh
2018
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy
2018
CEASER: Mitigating Conflict-Based Cache Attacks via Encrypted-Address and Remapping
2018
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
2018
Mitigating Wordline Crosstalk Using Adaptive Trees of Counters
2018
Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency
2018
Hiding Intermittent Information Leakage with Architectural Support for Blinking
2018
RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques
2018
Are Coherence Protocol States Vulnerable to Information Leakage?
2018
Record-Replay Architecture as a General Security Framework
2018
The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices
2018
BranchScope: A New Side-Channel Attack on Directional Branch Predictor
2018
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think
2018
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
2018
Meltdown: Reading Kernel Memory from User Space
2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
2018
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
2018
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU
2018
SoK: Keylogging Side Channels
2018
FPGA-Based Remote Power Side-Channel Attacks
2018
Another Flip in the Wall of Rowhammer Defenses
2018
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
2018
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
2018
OBLIVIATE : A Data Oblivious File System for Intel SGX
2018
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
2018
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
2018
How Secure Is Green IT? The Case of Software-Based Energy Side Channels
2018
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage
2018
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks
2018
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
2018
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic
2018
Cache side-channel attacks and time-predictability in high-performance critical real-time systems
2018
GPU obfuscation: attack and defense strategies
2018
It's hammer time: how to attack (rowhammer-based) DRAM-PUFs
2017
InvisiMem: Smart Memory Defenses for Memory Bus Side Channel
2017
ObfusMem: A Low-Overhead Access Obfuscation for Trusted Memories
2017
EDDIE: EM-Based Detection of Deviations in Program Execution
2017
Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Atacks
2017
Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures
2017
RHMD: evasion-resilient hardware malware detectors
2017
How secure is your cache against side-channel attacks?
2017
Constructing and characterizing covert channels on GPGPUs
2017
Secure Dynamic Memory Scheduling Against Timing Channel Attacks
2017
Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
2017
Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
2017
Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages
2017
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
2017
CacheD: Identifying Cache-Based Timing Channels in Production Software
2017
Side-Channel Attacks on Shared Search Indexes
2017
Leakage-Abuse Attacks against Order-Revealing Encryption
2017
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
2017
ASLR on the Line: Practical Cache Attacks on the MMU
2017
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
2017
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
2017
Securing Data Analytics on SGX with Randomization
2017
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
2017
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
2017
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic
2017
RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks
2017
Making DRAM Stronger Against Row Hammering
2017
Toggle MUX: How X-Optimism Can Lead to Malicious Hardware
2016
CATalyst: Defeating last-level cache side channel attacks in cloud computing
2016
A complete key recovery timing attack on a GPU
2016
CATalyst: Defeating last-level cache side channel attacks in cloud computing
2016
Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers
2016
ARMageddon: Cache Attacks on Mobile Devices
2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
2016
CaSE: Cache-Assisted Secure Execution on ARM Processors
2016
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
2016
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
2016
A Software Approach to Defeating Side Channels in Last-Level Caches
2016
Latency sensitivity-based cache partitioning for heterogeneous multi-core architecture
2016
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services
2016
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
2016
A high-resolution side-channel attack on last-level cache
2016
SecDCP: secure dynamic cache partitioning for efficient timing channel protection
2015
Avoiding information leakage in the memory controller with fixed service policies
2015
Fork path: improving efficiency of ORAM by removing redundant memory accesses
2015
Locking down insecure indirection with hardware-based control-data isolation
2015
Authenticache: harnessing cache ECC for system authentication
2015
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation
2015
Protecting Data on Smartphones and Tablets from Memory Attacks
2015
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs
2015
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
2015
A Placement Vulnerability Study in Multi-Tenant Public Clouds
2015
Thermal Covert Channels on Multi-core Platforms
2015
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
2015
Last-Level Cache Side-Channel Attacks are Practical
2015
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
2015
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration
2015
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
2015
Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks
2015
Information leakage chaff: feeding red herrings to side channel attackers
2014
Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution
2014
Random Fill Cache Architecture
2014
CC-Hunter: Uncovering Covert Timing Channels on Shared Processor Hardware
2014
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
2014
Using ARM trustzone to build a trusted language runtime for mobile applications
2014
Virtual ghost: protecting applications from hostile operating systems
2014
Sapper: a language for hardware-level security policy enforcement
2014
Scheduler-based Defenses against Cross-VM Side-channels
2014
Preventing Cryptographic Key Leakage in Cloud Virtual Machines
2014
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
2014
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks