2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00020
|View full text |Cite
|
Sign up to set email alerts
|

CrossTalk: Speculative Data Leaks Across Cores Are Real

Abstract: Recent transient execution attacks have demonstrated that attackers may leak sensitive information across security boundaries on a shared CPU core. Up until now, it seemed possible to prevent this by isolating potential victims and attackers on separate cores. In this paper, we show that the situation is more serious, as transient execution attacks can leak data across different cores on many modern Intel CPUs.We do so by investigating the behavior of x86 instructions, and in particular, we focus on complex mi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 76 publications
(41 citation statements)
references
References 22 publications
0
41
0
Order By: Relevance
“…VERIFY returns True only and only if e 1 = e 2 × e 3 . Otherwise, the verification of the signature fails (Line [35][36][37][38][39]. Note that the verification process (127.3 ms) is significantly more costly than the signing phase (3.4 ms) and the baseline method Elliptic Curve Digital Signature Algorithm (ECDSA) verification (74 ms).…”
Section: Appendix B Pseudo-codes For Ots-ske Implementationmentioning
confidence: 99%
“…VERIFY returns True only and only if e 1 = e 2 × e 3 . Otherwise, the verification of the signature fails (Line [35][36][37][38][39]. Note that the verification process (127.3 ms) is significantly more costly than the signing phase (3.4 ms) and the baseline method Elliptic Curve Digital Signature Algorithm (ECDSA) verification (74 ms).…”
Section: Appendix B Pseudo-codes For Ots-ske Implementationmentioning
confidence: 99%
“…Many side-channel attacks against enclaves have been identified in recent papers [15,51,53,54,9,41,31,40,2,38,10]; SGX has not been designed to prevent them [18]. There are attacks using various kinds of side-channel oracles-powerbased, timing-based, cache-based, FPU-based, etc.-to exfiltrate secrets and influence the behaviour of enclaves.…”
Section: Related Workmentioning
confidence: 99%
“…Mutation parameters in ABSynthe include instruction building blocks, repetition number, and use of memory barrier. Hardware fuzzing has also been utilized to improve existing Meltdown attacks [100] or find new variants of these attacks [65], automate the search for Spectre gadgets [90], and identify cross-core transient-execution attacks [77].…”
Section: Fuzzingmentioning
confidence: 99%