This webpage contains recent research papers on attacks/mitigations related to Memory Systems

Year Paper Title
2019 Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World
2018 Theory and Practice of Finding Eviction Sets
2018 Spectre Attacks: Exploiting Speculative Execution
2018 Let's Not Speculate: Discovering and Analyzing Speculative Execution Attacks
2018 A Systematic Evaluation of Transient Execution Attacks and Defenses
2018 Nonblocking Memory Refresh
2018 InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy
2018 CEASER: Mitigating Conflict-Based Cache Attacks via Encrypted-Address and Remapping
2018 DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
2018 Mitigating Wordline Crosstalk Using Adaptive Trees of Counters
2018 Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency
2018 Hiding Intermittent Information Leakage with Architectural Support for Blinking
2018 RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques
2018 Are Coherence Protocol States Vulnerable to Information Leakage?
2018 Record-Replay Architecture as a General Security Framework
2018 The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices
2018 BranchScope: A New Side-Channel Attack on Directional Branch Predictor
2018 Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think
2018 Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
2018 Meltdown: Reading Kernel Memory from User Space
2018 Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
2018 Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
2018 Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU
2018 SoK: Keylogging Side Channels
2018 FPGA-Based Remote Power Side-Channel Attacks
2018 Another Flip in the Wall of Rowhammer Defenses
2018 KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
2018 Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
2018 OBLIVIATE : A Data Oblivious File System for Intel SGX
2018 Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
2018 Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
2018 How Secure Is Green IT? The Case of Software-Based Energy Side Channels
2018 Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage
2018 Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks
2018 Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
2018 Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic
2018 Cache side-channel attacks and time-predictability in high-performance critical real-time systems
2018 GPU obfuscation: attack and defense strategies
2018 It's hammer time: how to attack (rowhammer-based) DRAM-PUFs
2017 InvisiMem: Smart Memory Defenses for Memory Bus Side Channel
2017 ObfusMem: A Low-Overhead Access Obfuscation for Trusted Memories
2017 EDDIE: EM-Based Detection of Deviations in Program Execution
2017 Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Atacks
2017 Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures
2017 RHMD: evasion-resilient hardware malware detectors
2017 How secure is your cache against side-channel attacks?
2017 Constructing and characterizing covert channels on GPGPUs
2017 Secure Dynamic Memory Scheduling Against Timing Channel Attacks
2017 Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
2017 Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
2017 Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages
2017 Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
2017 CacheD: Identifying Cache-Based Timing Channels in Production Software
2017 Side-Channel Attacks on Shared Search Indexes
2017 Leakage-Abuse Attacks against Order-Revealing Encryption
2017 Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
2017 ASLR on the Line: Practical Cache Attacks on the MMU
2017 SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
2017 T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs
2017 BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
2017 Securing Data Analytics on SGX with Randomization
2017 May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
2017 STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
2017 Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic
2017 RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks
2017 Making DRAM Stronger Against Row Hammering
2017 Toggle MUX: How X-Optimism Can Lead to Malicious Hardware
2016 CATalyst: Defeating last-level cache side channel attacks in cloud computing
2016 A complete key recovery timing attack on a GPU
2016 CATalyst: Defeating last-level cache side channel attacks in cloud computing
2016 Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers
2016 ARMageddon: Cache Attacks on Mobile Devices
2016 DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
2016 CaSE: Cache-Assisted Secure Execution on ARM Processors
2016 Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
2016 Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
2016 A Software Approach to Defeating Side Channels in Last-Level Caches
2016 Latency sensitivity-based cache partitioning for heterogeneous multi-core architecture
2016 Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services
2016 ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
2016 A high-resolution side-channel attack on last-level cache
2016 SecDCP: secure dynamic cache partitioning for efficient timing channel protection
2015 Avoiding information leakage in the memory controller with fixed service policies
2015 Fork path: improving efficiency of ORAM by removing redundant memory accesses
2015 Locking down insecure indirection with hardware-based control-data isolation
2015 Authenticache: harnessing cache ECC for system authentication
2015 GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation
2015 Protecting Data on Smartphones and Tablets from Memory Attacks
2015 Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
2015 SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs
2015 Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
2015 A Placement Vulnerability Study in Multi-Tenant Public Clouds
2015 Thermal Covert Channels on Multi-core Platforms
2015 S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
2015 Last-Level Cache Side-Channel Attacks are Practical
2015 Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
2015 Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration
2015 Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
2015 Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks
2015 Information leakage chaff: feeding red herrings to side channel attackers
2014 Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution
2014 Random Fill Cache Architecture
2014 CC-Hunter: Uncovering Covert Timing Channels on Shared Processor Hardware
2014 A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
2014 Using ARM trustzone to build a trusted language runtime for mobile applications
2014 Virtual ghost: protecting applications from hostile operating systems
2014 Sapper: a language for hardware-level security policy enforcement
2014 Scheduler-based Defenses against Cross-VM Side-channels
2014 Preventing Cryptographic Key Leakage in Cloud Virtual Machines
2014 FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
2014 Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks