Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.23018
|View full text |Cite
|
Sign up to set email alerts
|

ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(29 citation statements)
references
References 34 publications
0
25
0
Order By: Relevance
“…ABSynthe [15] and Osiris [48] automatically discover unknown side channels. In contrast, Revizor detects unknown speculative leaks into a known side-channel (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…ABSynthe [15] and Osiris [48] automatically discover unknown side channels. In contrast, Revizor detects unknown speculative leaks into a known side-channel (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Other fuzzing proposals use genetic algorithms to direct input generation towards interesting paths [48], [54]. Recently fuzzing has also been used to discover side channels both in software and in the microarchitecture [59], [21], [40], [18]. ct-fuzz [27] used fuzzing to discover timing side channels in cryptographic implementations.…”
Section: Fuzzing To Discover Side Channelsmentioning
confidence: 99%
“…Microarchitectural attacks. While early microarchitectural attacks such as classic cache side-channel attacks [69,98] or even more recent attacks [5,24,37,38,67,93] primarily focus on breaking crypto implementations, there is a large body of work on microarchitectural attacks to support software exploitation. Such attacks typically use side-channel disclosure to mimic limited memory read primitives [12,26,39] and fault attacks like Rowhammer to mimic limited memory write primitives [12,20,28,29,42,72,76,85,86,92].…”
Section: Related Workmentioning
confidence: 99%