Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy (original) (raw)

SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels

Kristin Barber

2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT), 2019

View PDFchevron_right

Isolating Speculative Data to Prevent Transient Execution Attacks

Kristin Barber

IEEE Computer Architecture Letters, 2019

View PDFchevron_right

Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution

Jiyong Yu

2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), 2020

View PDFchevron_right

Speculose: Analyzing the Security Implications of Speculative Execution in CPUs

Giorgi Maisuradze

Cornell University - arXiv, 2018

View PDFchevron_right

SoK: Hardware Defenses Against Speculative Execution Attacks

Ruby B. Lee

2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

View PDFchevron_right

DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors

Joel Emer

2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2018

View PDFchevron_right

Spectre Attacks: Exploiting Speculative Execution

Maverick Johnathan

View PDFchevron_right

Speculative interference attacks: breaking invisible speculation schemes

Ron Gabor

Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

View PDFchevron_right

Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract

Anton Cao

2020

View PDFchevron_right

Breaking the Memory Secrecy Assumption

Yves Younan

Proceedings of the …, 2009

View PDFchevron_right

Understanding Selective Delay as a Method for Efficient Secure Speculative Execution

Alexandra Jimborean

IEEE Transactions on Computers

View PDFchevron_right

Covert and side channels due to processor architecture

Ruby B. Lee

… Conference, 2006. ACSAC'06. 22nd Annual, 2006

View PDFchevron_right

Tracking Information Flow at the Gate-Level for Secure Architectures

Mohit Tiwari

View PDFchevron_right

Connecting the dots: Privacy leakage via write-access patterns to the main memory

Merin John

2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2017

View PDFchevron_right

Efficient invisible speculative execution through selective delay and value prediction

Magnus Själander

Proceedings of the 46th International Symposium on Computer Architecture

View PDFchevron_right

Creating Foundations for Secure Microarchitectures with Data-Oblivious ISA Extensions

Jiyong Yu

IEEE Micro, 2020

View PDFchevron_right

Efficient Information-Flow Verification Under Speculative Execution

Swen Jacobs

Automated Technology for Verification and Analysis, 2019

View PDFchevron_right

Preventing Information Leaks through Shadow Executions

Antonio Longo

2008 Annual Computer Security Applications Conference (ACSAC), 2008

View PDFchevron_right

Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses

Zeyu Mi

Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

View PDFchevron_right

ShadowStack: A new approach for secure program execution

Fabian Vargas

Microelectronics Reliability, 2015

View PDFchevron_right

Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks

Magnus Själander

ArXiv, 2021

View PDFchevron_right

A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems

Pablo Buiras

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Output-Sensitive Information Flow Analysis

Cristian Ene

Formal Techniques for Distributed Objects, Components, and Systems, 2019

View PDFchevron_right

Gate-Level Information-Flow Tracking for Secure Architectures

Hassan Wassel

2010

View PDFchevron_right

PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications

Assad Moini

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), 2020

View PDFchevron_right

Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception

Frederico Araujo

View PDFchevron_right

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Yanqi Zhou

2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)

View PDFchevron_right

Exposing cache timing side-channel leaks through out-of-order symbolic execution

Jiyong Yu

Proceedings of the ACM on Programming Languages, 2020

View PDFchevron_right

Protection of Software Algorithms Executed on Secure Microprocessors

Henk D L Hollmann

Cardis, 1996

View PDFchevron_right

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation

TIANYU ZHOU

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

View PDFchevron_right

Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks

Pietro Frigo

2022

View PDFchevron_right

Preventing Timing Leaks Through Transactional Branching Instructions

Tamara Rezk

Electronic Notes in Theoretical Computer Science, 2006

View PDFchevron_right

New Models for Understanding and Reasoning about Speculative Execution Attacks

Ruby B. Lee

2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)

View PDFchevron_right