2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA) 2021
DOI: 10.1109/isca52012.2021.00035
|View full text |Cite
|
Sign up to set email alerts
|

Opening Pandora’s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 75 publications
0
3
0
Order By: Relevance
“…Prefetchers have been exploited to leak data from program memory either through side channels [7,17,29,30,32] or by constructing covert channels [7,8,28]. Side-channel attacks exploiting prefetching target either hardware-based or software-based prefetching.…”
Section: Prefetcher Exploitationmentioning
confidence: 99%
See 1 more Smart Citation
“…Prefetchers have been exploited to leak data from program memory either through side channels [7,17,29,30,32] or by constructing covert channels [7,8,28]. Side-channel attacks exploiting prefetching target either hardware-based or software-based prefetching.…”
Section: Prefetcher Exploitationmentioning
confidence: 99%
“…Recent works [29,30] examine data memory-dependent prefetchers [42], such as the pointer-array prefetcher in Apple M1 processors [29]. This prefetcher is exploited to perform out-of-bounds reads and retrieve leaked pointers.…”
Section: Prefetcher Exploitationmentioning
confidence: 99%
“…Moreover, the main source of concern for energy usage in IoT systems is data transmission bandwidth and speed of response, which are regarded as cloud computing operating costs [6]. All digital apps have progressed with microprocessors, each with a dedicated processing unit for an intended area [7]. However, causing damage to the microarchitecture element influenced the whole system by ingesting a large amount of power and assets [8].…”
Section: Introductionmentioning
confidence: 99%
“…To make things worse, a recent survey [18] highlighted seven classes of microarchitectural optimizations that all undermine the constant-time paradigm. While exploiting some of these optimizations in commodity processors may seem unrealistic, an attack called Augury [19] demonstrated that this threat is not only a theoretical one.…”
Section: Introductionmentioning
confidence: 99%