IACR Transactions on Cryptographic Hardware and Embedded Systems 2019
DOI: 10.13154/tches.v2020.i1.321-347
|View full text |Cite
|
Sign up to set email alerts
|

Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Usually, the mitigation techniques for attacks in the same category are similar to each other. For instance, Controlled Channel Attacks [9]- [14] and Branch Prediction Attacks [26]- [28] can be mitigated using Compiler/SDK techniques or modifying the Application design.…”
Section: Discussion On the Current Status Of Mitigationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, the mitigation techniques for attacks in the same category are similar to each other. For instance, Controlled Channel Attacks [9]- [14] and Branch Prediction Attacks [26]- [28] can be mitigated using Compiler/SDK techniques or modifying the Application design.…”
Section: Discussion On the Current Status Of Mitigationsmentioning
confidence: 99%
“…This shows that the branch predictor unit can be vulnerable even in the face of BTB protections. Bluethunder [28] is another branch predictor attack similar to BranchScope. The main difference of Bluethunder to BranchScope is that Bluethunder uses a 2-level directional predictor which is a completely different branch predictor unit.…”
Section: Branch Prediction Attacks [26]-[28]mentioning
confidence: 99%
“…Papers such as [7,11,76] have identified vulnerabilities in the TEE implementation, resulting in memory and CPU register leaks, as well as the creation of fake attestation reports. Side channel attacks allow attackers to extract secrets from the enclave by observing resources such as caches [10,15,20,27,48,64], branch predictions [21,30,37], and memory usage [49]. Tools such as SGX-Step [74] provide attackers with instruction level control and increase the efficiency of side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%