ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.05575
  4. Cited By
MicroWalk: A Framework for Finding Side Channels in Binaries

MicroWalk: A Framework for Finding Side Channels in Binaries

16 August 2018
Jan Wichelmann
A. Moghimi
T. Eisenbarth
B. Sunar
ArXivPDFHTML

Papers citing "MicroWalk: A Framework for Finding Side Channels in Binaries"

14 / 14 papers shown
Title
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
Hossam ElAtali
Merve Gülmez
Thomas Nyman
N. Asokan
49
0
0
20 Apr 2025
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
71
2,181
0
03 Jan 2018
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection
  Tool for Crypto Libraries
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
Gorka Irazoqui Apecechea
Kai Cong
Xiaofei Guo
Hareesh Khattri
A. Kanuparthi
T. Eisenbarth
B. Sunar
29
16
0
05 Sep 2017
Stacco: Differentially Analyzing Side-Channel Traces for Detecting
  SSL/TLS Vulnerabilities in Secure Enclaves
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao
Mengyuan Li
Sanchuan Chen
Yinqian Zhang
54
74
0
11 Jul 2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
  Hazards in SGX
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
Xiaofeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
AAML
57
371
0
20 May 2017
PerfWeb: How to Violate Web Privacy with Hardware Performance Events
PerfWeb: How to Violate Web Privacy with Hardware Performance Events
Berk Gülmezoglu
A. Zankl
T. Eisenbarth
B. Sunar
39
46
0
12 May 2017
CacheZoom: How SGX Amplifies The Power of Cache Attacks
CacheZoom: How SGX Amplifies The Power of Cache Attacks
A. Moghimi
Gorka Irazoqui Apecechea
T. Eisenbarth
48
333
0
20 Mar 2017
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz
Samuel Weiser
Daniel Gruss
Clémentine Maurice
Stefan Mangard
48
426
0
28 Feb 2017
Software Grand Exposure: SGX Cache Attacks Are Practical
Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
87
609
0
24 Feb 2017
Systematic Classification of Side-Channel Attacks: A Case Study for
  Mobile Devices
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
62
214
0
11 Nov 2016
Rigorous Analysis of Software Countermeasures against Cache Attacks
Rigorous Analysis of Software Countermeasures against Cache Attacks
Goran Doychev
Boris Köpf
28
75
0
07 Mar 2016
ARMageddon: Cache Attacks on Mobile Devices
ARMageddon: Cache Attacks on Mobile Devices
Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
FedML
47
428
0
16 Nov 2015
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Daniel Gruss
Clémentine Maurice
Stefan Mangard
44
417
0
24 Jul 2015
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
Yossef Oren
V. Kemerlis
S. Sethumadhavan
A. Keromytis
69
330
0
25 Feb 2015
1