Side Channel

[Google Scholar] [Wikipedia]

Notes: security
Papers: ge:jce:2016

Differential Power Analysis, Language based security, Security

  • Hardware is the new software [baumann:hotos:2017]
  • SoK: Design tools for side-channel-aware implementations [buhan:ccs:2022]
  • A survey of microarchitectural timing attacks and countermeasures on contemporary hardware [ge:jce:2016]
  • Solver-aided constant-time hardware verification [gleissenthall:ccs:2021]
  • InSpectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis [guanciale:ccs:2020]
  • Spectector: Principled detection of speculative information flows [guarnieri:sandp:2020]
  • Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors [kim:isca:2014]
  • Spectre attacks: Exploiting speculative execution [kocher:arxiv:2018]
  • Differential power analysis [kocher:crypto:1999]
  • Meltdown [lipp:arxiv:2018]
  • TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks [martin:isca:2012]
  • Spectre is here to stay: An analysis of side-channels and speculative execution [mcilroy:arxiv:2019]
  • Axiomatic hardware-software contracts for security [mosier:isca:2022]
  • Flip Feng Shui: Hammering a needle in the software stack [razavi:usenix:2016]
  • Zero-overhead path prediction with progressive symbolic execution [rutledge:icse:2019]
  • CLKSCREW: Exposing the perils of security-oblivious energy management [tang:sec:2017]
  • Opening Pandora's box: A systematic study of new ways microarchitecture can leak private data [vicarte:isca:2021]
  • CacheQuery: Learning replacement policies from hardware caches [vila:pldi:2020]