Breaking and Fixing Speculative Load Hardening. | 0 | 0.34 | 2022 |
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution | 0 | 0.34 | 2022 |
Side-Channeling the Kalyna Key Expansion | 0 | 0.34 | 2022 |
RSA Key Recovery from Digit Equivalence Information | 0 | 0.34 | 2022 |
Opportunities for genetic improvement of cryptographic code. | 0 | 0.34 | 2022 |
HammerScope: Observing DRAM Power Consumption Using Rowhammer | 0 | 0.34 | 2022 |
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses | 0 | 0.34 | 2021 |
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code | 0 | 0.34 | 2021 |
RSA Key Recovery from Digit Equivalence Information. | 0 | 0.34 | 2021 |
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms | 0 | 0.34 | 2021 |
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses] | 1 | 0.35 | 2021 |
CacheOut: Leaking Data on Intel CPUs via Cache Evictions | 2 | 0.38 | 2021 |
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality | 0 | 0.34 | 2021 |
Spectre attacks: exploiting speculative execution | 1 | 0.34 | 2020 |
RAMBleed: Reading Bits in Memory Without Accessing Them | 11 | 0.48 | 2020 |
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. | 0 | 0.34 | 2020 |
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage | 4 | 0.47 | 2020 |
Meltdown: reading kernel memory from user space | 13 | 0.58 | 2020 |
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection | 8 | 0.53 | 2020 |
Security Architecture Framework for Enterprises. | 0 | 0.34 | 2020 |
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG | 2 | 0.36 | 2020 |
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses | 2 | 0.36 | 2020 |
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities | 0 | 0.34 | 2020 |
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. | 3 | 0.38 | 2019 |
Fallout: Reading Kernel Writes From User Space. | 0 | 0.34 | 2019 |
Fallout: Leaking Data on Meltdown-resistant CPUs | 17 | 0.65 | 2019 |
Rosita: Towards Automatic Elimination Of Power-Analysis Leakage In Ciphers | 1 | 0.36 | 2019 |
Another Flip in the Wall of Rowhammer Defenses | 30 | 0.87 | 2018 |
Robust Website Fingerprinting Through The Cache Occupancy Channel | 2 | 0.36 | 2018 |
Time Protection: the Missing OS Abstraction. | 5 | 0.41 | 2018 |
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. | 1 | 0.34 | 2018 |
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay | 2 | 0.37 | 2018 |
Drive-by Key-Extraction Cache Attacks from Portable Code. | 1 | 0.34 | 2018 |
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. | 45 | 1.24 | 2018 |
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations | 1 | 0.35 | 2018 |
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures. | 6 | 0.41 | 2017 |
CacheBleed: a timing attack on OpenSSL constant-time RSA. | 41 | 1.08 | 2017 |
Usb Snooping Made Easy: Crosstalk Leakage Attacks On Usb Hubs | 1 | 0.35 | 2017 |
Modifying an Enciphering Scheme after Deployment. | 2 | 0.38 | 2017 |
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. | 12 | 0.73 | 2017 |
Sliding Right Into Disaster: Left-To-Right Sliding Windows Leak | 4 | 0.41 | 2017 |
Amplifying Side Channels Through Performance Degradation. | 12 | 0.58 | 2016 |
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. | 34 | 0.94 | 2016 |
Do Hardware Cache Flushing Operations Actually Meet Our Expectations? | 0 | 0.34 | 2016 |
"Make Sure DSA Signing Exponentiations Really are Constant-Time". | 19 | 0.68 | 2016 |
Last-Level Cache Side-Channel Attacks are Practical | 223 | 5.34 | 2015 |
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs. | 0 | 0.34 | 2015 |
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. | 1 | 0.35 | 2015 |
Mapping the Intel Last-Level Cache. | 14 | 0.80 | 2015 |
\"Ooh Aah... Just a Little Bit\": A Small Amount of Side Channel Can Go a Long Way | 57 | 1.69 | 2014 |