Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy (original) (raw)
Related papers
SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels
2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT), 2019
Isolating Speculative Data to Prevent Transient Execution Attacks
IEEE Computer Architecture Letters, 2019
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), 2020
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
Cornell University - arXiv, 2018
SoK: Hardware Defenses Against Speculative Execution Attacks
2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2018
Spectre Attacks: Exploiting Speculative Execution
Speculative interference attacks: breaking invisible speculation schemes
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract
2020
Breaking the Memory Secrecy Assumption
Proceedings of the …, 2009
Understanding Selective Delay as a Method for Efficient Secure Speculative Execution
IEEE Transactions on Computers
Covert and side channels due to processor architecture
… Conference, 2006. ACSAC'06. 22nd Annual, 2006
Tracking Information Flow at the Gate-Level for Secure Architectures
Connecting the dots: Privacy leakage via write-access patterns to the main memory
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2017
Efficient invisible speculative execution through selective delay and value prediction
Proceedings of the 46th International Symposium on Computer Architecture
Creating Foundations for Secure Microarchitectures with Data-Oblivious ISA Extensions
IEEE Micro, 2020
Efficient Information-Flow Verification Under Speculative Execution
Automated Technology for Verification and Analysis, 2019
Preventing Information Leaks through Shadow Executions
2008 Annual Computer Security Applications Conference (ACSAC), 2008
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
ShadowStack: A new approach for secure program execution
Microelectronics Reliability, 2015
Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks
ArXiv, 2021
A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems
Lecture Notes in Computer Science, 2014
Output-Sensitive Information Flow Analysis
Formal Techniques for Distributed Objects, Components, and Systems, 2019
Gate-Level Information-Flow Tracking for Secure Architectures
2010
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), 2020
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception
Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)
Exposing cache timing side-channel leaks through out-of-order symbolic execution
Proceedings of the ACM on Programming Languages, 2020
Protection of Software Algorithms Executed on Secure Microprocessors
Cardis, 1996
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2022
Preventing Timing Leaks Through Transactional Branching Instructions
Electronic Notes in Theoretical Computer Science, 2006
New Models for Understanding and Reasoning about Speculative Execution Attacks
2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)