ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1912.04870
  4. Cited By
V0LTpwn: Attacking x86 Processor Integrity from Software

V0LTpwn: Attacking x86 Processor Integrity from Software

10 December 2019
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
A. Sadeghi
ArXiv (abs)PDFHTML

Papers citing "V0LTpwn: Attacking x86 Processor Integrity from Software"

25 / 25 papers shown
Title
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and
  Future Directions
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
84
0
0
21 Aug 2024
Do Not Trust Power Management: Challenges and Hints for Securing Future
  Trusted Execution Environments
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments
O. L. Gonidec
Maria Méndez Real
Guillaume Bouffard
Jean-Christophe Prévotet
52
0
0
24 May 2024
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors
  (Technical Report)
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)
Dhiman Chakraborty
Michael Schwarz
Sven Bugiel
129
0
0
06 Jun 2023
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM
  SoCs
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
Hritvik Taneja
Jason Kim
Jie Xu
S. V. Schaik
Daniel Genkin
Y. Yarom
70
29
0
22 May 2023
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs
Yu Jin
Pengfei Qiu
Chunlu Wang
Yihao Yang
Dongsheng Wang
Gang Qu
45
1
0
21 Apr 2023
Oops..! I Glitched It Again! How to Multi-Glitch the
  Glitching-Protections on ARM TrustZone-M
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Xhani Marvin Saß
Richard Mitev
A. Sadeghi
66
10
0
14 Feb 2023
PMFault: Faulting and Bricking Server CPUs through Management Interfaces
PMFault: Faulting and Bricking Server CPUs through Management Interfaces
Zitai Chen
David F. Oswald
50
7
0
13 Jan 2023
TuRaN: True Random Number Generation Using Supply Voltage Underscaling
  in SRAMs
TuRaN: True Random Number Generation Using Supply Voltage Underscaling in SRAMs
Ismail Emir Yüksel
Ataberk Olgun
Behzad Salami
F. N. Bostanci
Yahya Can Tugrul
A. G. Yaglikçi
Nika Mansouri-Ghiasi
O. Mutlu
Oguz Ergin
41
3
0
20 Nov 2022
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and
  Server Hardware
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Niclas Kühnapfel
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Christian Werling
Jean-Pierre Seifert
26
6
0
20 Sep 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
93
4
0
20 Apr 2022
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models
  for Finding Software-Exploitable Vulnerabilities
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Aakash Tyagi
Addison Crump
A. Sadeghi
Garrett Persyn
Jeyavijayan Rajendran
Patrick Jauernig
Rahul Kande
69
66
0
24 Jan 2022
Secure Remote Attestation with Strong Key Insulation Guarantees
Secure Remote Attestation with Strong Key Insulation Guarantees
Deniz Gurevin
Chenglu Jin
Phuong Ha Nguyen
O. Khan
Marten van Dijk
32
4
0
05 Jan 2022
Lightning: Striking the Secure Isolation on GPU Clouds with Transient
  Hardware Faults
Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults
Rihui Sun
Pefei Qiu
Yongqiang Lyu
Donsheng Wang
Jiang Dong
Gang Qu
65
5
0
07 Dec 2021
Domain Page-Table Isolation
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
49
3
0
21 Nov 2021
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight
  Stealing in Memories
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Adnan Siraj Rakin
Md Hafizul Islam Chowdhuryy
Fan Yao
Deliang Fan
AAMLMIACV
81
117
0
08 Nov 2021
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security
  Architectures
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Ghada Dessouky
Alexander Gruler
Pouya Mahmoody
A. Sadeghi
Emmanuel Stapf
77
24
0
15 Oct 2021
Garmr: Defending the gates of PKU-based sandboxing
Garmr: Defending the gates of PKU-based sandboxing
Alexios Voulimeneas
Jonas Vinck
Ruben Mechelinck
Stijn Volckaert
18
0
0
10 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILMAAML
77
10
0
23 Sep 2021
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's
  Secure Encrypted Virtualization
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
64
63
0
10 Aug 2021
Scrooge Attack: Undervolting ARM Processors for Profit
Scrooge Attack: Undervolting ARM Processors for Profit
Christian Gottel
K. Parasyris
O. Unsal
Pascal Felber
Marcelo Pasin
V. Schiavoni
35
2
0
01 Jul 2021
Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data
  Collection using Trusted Execution Environment (TEE)
Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data Collection using Trusted Execution Environment (TEE)
Chunchi Liu
Hechuan Guo
Minghui Xu
Shengling Wang
Dongxiao Yu
Jiguo Yu
Xiuzhen Cheng
92
42
0
30 Jun 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
49
10
0
07 May 2021
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier
J. Dutertre
Yannick Teglia
Philippe Loubet-Moundi
14
12
0
16 Sep 2020
Artificial Neural Networks and Fault Injection Attacks
Artificial Neural Networks and Fault Injection Attacks
Shahin Tajik
F. Ganji
SILM
66
11
0
17 Aug 2020
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
Yang Liu
75
53
0
23 Feb 2020
1