ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.03443
  4. Cited By
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring
  Interconnect Are Practical

Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical

5 March 2021
Riccardo Paccagnella
Licheng Luo
Christopher W. Fletcher
ArXivPDFHTML

Papers citing "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"

25 / 25 papers shown
Title
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
Bradley Morgan
Gal Horowitz
Sioli O'Connell
S. V. Schaik
C. Chuengsatiansup
Daniel Genkin
Olaf Maennel
Paul Montague
Eyal Ronen
Y. Yarom
27
0
0
15 Apr 2025
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Taehun Kim
Hyerean Jang
Youngjoo Shin
54
0
0
13 Mar 2025
U Can Touch This! Microarchitectural Timing Attacks via Machine Clears
U Can Touch This! Microarchitectural Timing Attacks via Machine Clears
Billy Bob Brumley
54
0
0
17 Feb 2025
I Know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs
Cheng Gu
Yicheng Zhang
Nael B. Abu-Ghazaleh
31
0
0
16 Nov 2024
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
42
0
0
05 Sep 2024
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging
  Generative AI Workloads
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads
Aritra Dhar
Clément Thorens
Lara Magdalena Lazier
Lukas Cavigelli
51
1
0
16 Jul 2024
BliMe Linter
BliMe Linter
Hossam ElAtali
Xiaohe Duan
Hans Liljestrand
Meng Xu
N. Asokan
33
0
0
21 Jun 2024
Remote Keylogging Attacks in Multi-user VR Applications
Remote Keylogging Attacks in Multi-user VR Applications
Zihao Su
Kunlin Cai
Reuben Beeler
Lukas Dresel
Allan Garcia
Ilya Grishchenko
Yuan Tian
Christopher Kruegel
Giovanni Vigna
26
4
0
22 May 2024
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public
  Cloud (Extended Version)
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
Josep Torrellas
29
7
0
21 May 2024
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
  Environments
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Debopriya Roy Dipta
T. Tiemann
Berk Gülmezoglu
Eduard Marin
T. Eisenbarth
34
0
0
16 Apr 2024
Reviving Meltdown 3a
Reviving Meltdown 3a
Daniel Weber
Fabian Thomas
Lukas Gerlach
Ruiyi Zhang
Michael Schwarz
18
2
0
06 Oct 2023
Exploiting Parallel Memory Write Requests for Covert Channel Attacks in
  Integrated CPU-GPU Systems
Exploiting Parallel Memory Write Requests for Covert Channel Attacks in Integrated CPU-GPU Systems
Ghadeer Almusaddar
Hoda Naghibijouybari
GNN
23
3
0
30 Jul 2023
New Covert and Side Channels Based on Retirement
New Covert and Side Channels Based on Retirement
Ke Xu
Ming Tang
Quancheng Wang
Han Wang
16
0
0
24 Jul 2023
BandwidthBreach: Unleashing Covert and Side Channels through Cache
  Bandwidth Exploitation
BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation
Han Wang
Ming Tang
Ke Xu
Quancheng Wang
21
2
0
03 Jun 2023
Defensive ML: Defending Architectural Side-channels with Adversarial
  Obfuscation
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation
Hyoungwook Nam
Raghavendra Pradyumna Pothukuchi
Bohao Li
N. Kim
Josep Torrellas
AAML
14
2
0
03 Feb 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on
  Microarchitectural Optimizations
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
N. Holtryd
M. Manivannan
P. Stenström
AAML
33
2
0
20 Dec 2022
Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel
  CPUs
Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel CPUs
Jan Philipp Thoma
Tim Güneysu
22
12
0
05 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and
  Linker-introduced Leakage
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
39
2
0
03 Aug 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
31
4
0
20 Apr 2022
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Zhihao Yao
S. Talebi
M. Chen
A. A. Sani
Thomas Anderson
24
1
0
15 Mar 2022
Attack of the Knights: A Non Uniform Cache Side-Channel Attack
Attack of the Knights: A Non Uniform Cache Side-Channel Attack
Farabi Mahmud
Sungkeun Kim
H. Chawla
Chia-Che Tsai
Eun Jung Kim
A. Muzahid
14
1
0
19 Dec 2021
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Yanan Guo
Andrew Zigerelli
Youtao Zhang
Jun Yang
SILM
13
30
0
24 Oct 2021
Leaky Frontends: Security Vulnerabilities in Processor Frontends
Leaky Frontends: Security Vulnerabilities in Processor Frontends
Shuwen Deng
Bowen Huang
Jakub Szefer
12
23
0
25 May 2021
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU
  Systems
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems
S. B. Dutta
Hoda Naghibijouybari
Nael B. Abu-Ghazaleh
Andres Marquez
Kevin J. Barker
GNN
11
40
0
19 Nov 2020
Composite Enclaves: Towards Disaggregated Trusted Execution
Composite Enclaves: Towards Disaggregated Trusted Execution
Moritz Schneider
Aritra Dhar
Ivan Puddu
Kari Kostiainen
Srdjan Capkun
13
16
0
20 Oct 2020
1