ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.09085
  4. Cited By
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via
  Speculative Execution

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution

25 February 2018
Guoxing Chen
Sanchuan Chen
Yuan Xiao
Yinqian Zhang
Zhiqiang Lin
T. Lai
    SILM
ArXivPDFHTML

Papers citing "SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution"

13 / 13 papers shown
Title
RouTEE: A Secure Payment Network Routing Hub using Trusted Execution Environments
RouTEE: A Secure Payment Network Routing Hub using Trusted Execution Environments
Junmo Lee
Seongjun Kim
Sanghyeon Park
Soo-Mook Moon
MoE
32
3
0
08 Dec 2020
Speculative Dereferencing of Registers:Reviving Foreshadow
Speculative Dereferencing of Registers:Reviving Foreshadow
Martin Schwarzl
T. Schuster
Michael Schwarz
Daniel Gruss
SILM
106
11
0
05 Aug 2020
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
54
419
0
14 May 2019
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
33
230
0
27 Jul 2018
ret2spec: Speculative Execution Using Return Stack Buffers
ret2spec: Speculative Execution Using Return Stack Buffers
G. Maisuradze
C. Rossow
SILM
38
254
0
26 Jul 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
69
2,171
0
03 Jan 2018
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
  Hazards in SGX
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
Xiaofeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
AAML
49
370
0
20 May 2017
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz
Samuel Weiser
Daniel Gruss
Clémentine Maurice
Stefan Mangard
46
424
0
28 Feb 2017
Software Grand Exposure: SGX Cache Attacks Are Practical
Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
82
605
0
24 Feb 2017
SGXIO: Generic Trusted I/O Path for Intel SGX
SGXIO: Generic Trusted I/O Path for Intel SGX
Samuel Weiser
M. Werner
UQCV
47
95
0
04 Jan 2017
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch
  Shadowing
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
43
504
0
21 Nov 2016
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
Sandeep Tamrakar
Jian Liu
Andrew Paverd
Jan-Erik Ekberg
Benny Pinkas
Nadarajah Asokan
32
55
0
06 Jun 2016
A software approach to defeating side channels in last-level caches
A software approach to defeating side channels in last-level caches
Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
34
148
0
17 Mar 2016
1