ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2503.10074
  4. Cited By
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
v1v2 (latest)

Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension

13 March 2025
Taehun Kim
Hyerean Jang
Youngjoo Shin
ArXiv (abs)PDFHTML

Papers citing "Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension"

12 / 12 papers shown
Title
AVX Timing Side-Channel Attacks against Address Space Layout
  Randomization
AVX Timing Side-Channel Attacks against Address Space Layout Randomization
Hyunwoo Choi
Suryeon Kim
Seungwon Shin
AAML
39
3
0
17 Apr 2023
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Yanan Guo
Andrew Zigerelli
Youtao Zhang
Jun Yang
SILM
59
32
0
24 Oct 2021
Osiris: Automated Discovery of Microarchitectural Side Channels
Osiris: Automated Discovery of Microarchitectural Side Channels
Daniel Weber
A. Ibrahim
Hamed Nemati
Michael Schwarz
C. Rossow
58
64
0
07 Jun 2021
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel
  Defenses
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
A. Shusterman
Ayush Agarwal
Sioli O'Connell
Daniel Genkin
Yossef Oren
Y. Yarom
41
65
0
08 Mar 2021
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring
  Interconnect Are Practical
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
Riccardo Paccagnella
Licheng Luo
Christopher W. Fletcher
51
106
0
05 Mar 2021
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs
  (Updated and Extended Version)
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs (Updated and Extended Version)
Michael Schwarz
Claudio Canella
Lukas Giner
Daniel Gruss
73
45
0
14 May 2019
SMoTherSpectre: exploiting speculative execution through port contention
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
61
243
0
05 Mar 2019
Theory and Practice of Finding Eviction Sets
Theory and Practice of Finding Eviction Sets
Pepe Vila
Boris Köpf
J. Morales
44
130
0
02 Oct 2018
Speculose: Analyzing the Security Implications of Speculative Execution
  in CPUs
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
G. Maisuradze
C. Rossow
72
24
0
12 Jan 2018
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
84
456
0
27 Nov 2015
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
104
581
0
14 Nov 2015
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
Yossef Oren
V. Kemerlis
S. Sethumadhavan
A. Keromytis
99
330
0
25 Feb 2015
1