Browse > Article

CPU 마이크로아키텍처 보안 기술 연구 동향  

Sin, Yeong-Ju (고려대학교 정보보호대학원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Kurth, B. Gras, D. Andriesse, C. Giuffrida, H. Bos, and K. Razavi, "NetCAT : Practical Cache Attacks from the Network," in Proceedings of 2020 IEEE Symposium on Security and Privacy, 2020.
2 M. Guarnieri, B. Kopf, J. F. Morales, J. Reineke, and A. Sanchez, "SPECTECTOR: Principled Detection of Speculative Information Flows," in Proceedings of 2020 IEEE Symposium on Security and Privacy, 2020.
3 A. Cabrera Aldaya, B. Bob Brumley, S. ul Hassan, C. Pereida Garcia, and N. Tuveri, "Port Contention for Fun and Profit," in Proceedings of 2019 IEEE Symposium on Security and Privacy, 2019.
4 C. Canella et al., "A Systematic Evaluation of Transient Execution Attacks and Defenses," in Proceedings of the 28th USENIX Security Symposium, 2019.
5 Y. Yarom and K. Falkner, "Flush + Reload : a High Resolution , Low Noise, L3 Cache Side-Channel Attack," in Proceedings of the 23th USENIX Security Symposium, 2014.
6 G. Dessouky, T. Frassetto, and A.-R. Sadeghi, "HybCache: Hybrid Side-Channel-Resilient Cachesfor Trusted Execution Environments," in Proceedings of the 29th USENIX Security Symposium, 2020.
7 H. Oh, A. Ahmad, B. Lee, and Y. Paek, "TrustOre: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA," in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
8 R. Guanciale, "InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis," in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
9 E. Goktas, K. Razavi, K. Ch, E. Zurich, G. Portokalidis, and H. Bos, "Speculative Probing: Hacking Blind in the Spectre Era," in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
10 J. Wang, K. Sun, L. Lei, S. Wan, Y. Wang, and J. Jing, "Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments," in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
11 D. Lee, D. Jung, I. T. Fang, C.-C. Tsai, and R. A. Popa, "An Off-Chip Attack on Hardware Enclaves via the Memory Bus," in Proceedings of the 29th USENIX Security Symposium, 2020.
12 D. Moghimi, M. Lipp, B. Sunar, and M. Schwarz, "Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis," in Proceedings of the 29th USENIX Security Symposium, 2020.
13 S. Briongos, P. Malagon, J. M. Moya, and T. Eisenbarth, "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks," in Proceedings of the 29th USENIX Security Symposium, 2020.
14 E. M. Koruyeh, S. Haji, A. Shirazi, K. N. Khasawneh, C. Song, and N. Abu-Ghazaleh, "SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation," in Proceedings of 2020 IEEE Symposium on Security and Privacy, 2020.
15 K. Murdock, D. Oswald, F. D. Garcia, J. Van Bulck, D. Gruss, and F. Piessens, "Plundervolt : Software-based Fault Injection Attacks against Intel SGX," in Proceedings of 2020 IEEE Symposium on Security and Privacy, 2020.
16 M. Schwarz, M. Lipp, C. Canella, R. Schilling, F. Kargl, and D. Gruss, "ConTExT: A Generic Approach for Mitigating Spectre," in Proceedings 2020 Network and Distributed System Security Symposium, 2020.
17 Y. Xiao, Y. Zhang, and R. Teodorescu, "SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities," in Proceedings 2020 Network and Distributed System Security Symposium, 2020.
18 Q. Tan and K. Bu, "PhantomCache : Obfuscating Cache Conflicts with Localized Randomization," in Proceedings 2020 Network and Distributed System Security Symposium, 2020.
19 J. Van Bulck et al., "LVI : Hijacking Transient Execution through Microarchitectural Load Value Injection," in Proceedings of 2020 IEEE Symposium on Security and Privacy, 2020.