Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu

Author:

Chen Sanchuan1,Zhang Xiaokuan1,Reiter Michael K.2,Zhang Yinqian1

Affiliation:

1. The Ohio State University, Columbus, OH, USA

2. University of North Carolina, Chapel Hill, NC, USA

Funder

National Science Foundation

Publisher

ACM

Reference60 articles.

1. Intel 64 and IA-32 architectures software developer's manual combined volumes:1 2A 2B 2C 3A 3B and 3C. http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html. version 052 retrieved on Dec 25 2014. Intel 64 and IA-32 architectures software developer's manual combined volumes:1 2A 2B 2C 3A 3B and 3C. http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html. version 052 retrieved on Dec 25 2014.

2. Intel 64 and IA-32 architectures software developer's manual volumes 3d: System programming guide part 4. http://www.intel.eu/content/www/eu/en/architecture-and-technology/64-ia-32-architectures-software-developer-vol-3d-part-4-manual.html. Order Number: 332831-059US June 2016. Intel 64 and IA-32 architectures software developer's manual volumes 3d: System programming guide part 4. http://www.intel.eu/content/www/eu/en/architecture-and-technology/64-ia-32-architectures-software-developer-vol-3d-part-4-manual.html. Order Number: 332831-059US June 2016.

3. Intel Software Guard Extensions programming reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf. October 2014. Intel Software Guard Extensions programming reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf. October 2014.

4. nbench-byte benchmarks. http://www.math.cmu.edu/~florin/bench-32--64/nbench/. nbench-byte benchmarks. http://www.math.cmu.edu/~florin/bench-32--64/nbench/.

5. Yet another MicroArchitectural Attack:

Cited by 89 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. No Forking Way: Detecting Cloning Attacks on Intel SGX Applications;Annual Computer Security Applications Conference;2023-12-04

2. TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors;Financial Cryptography and Data Security;2023-12-01

3. EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16

4. GraphOS: Towards Oblivious Graph Processing;Proceedings of the VLDB Endowment;2023-09

5. ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE;2023 60th ACM/IEEE Design Automation Conference (DAC);2023-07-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3