Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1912.04870
Cited By
V0LTpwn: Attacking x86 Processor Integrity from Software
10 December 2019
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
A. Sadeghi
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"V0LTpwn: Attacking x86 Processor Integrity from Software"
25 / 25 papers shown
Title
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
84
0
0
21 Aug 2024
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments
O. L. Gonidec
Maria Méndez Real
Guillaume Bouffard
Jean-Christophe Prévotet
52
0
0
24 May 2024
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)
Dhiman Chakraborty
Michael Schwarz
Sven Bugiel
129
0
0
06 Jun 2023
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
Hritvik Taneja
Jason Kim
Jie Xu
S. V. Schaik
Daniel Genkin
Y. Yarom
70
29
0
22 May 2023
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs
Yu Jin
Pengfei Qiu
Chunlu Wang
Yihao Yang
Dongsheng Wang
Gang Qu
45
1
0
21 Apr 2023
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Xhani Marvin Saß
Richard Mitev
A. Sadeghi
66
10
0
14 Feb 2023
PMFault: Faulting and Bricking Server CPUs through Management Interfaces
Zitai Chen
David F. Oswald
50
7
0
13 Jan 2023
TuRaN: True Random Number Generation Using Supply Voltage Underscaling in SRAMs
Ismail Emir Yüksel
Ataberk Olgun
Behzad Salami
F. N. Bostanci
Yahya Can Tugrul
A. G. Yaglikçi
Nika Mansouri-Ghiasi
O. Mutlu
Oguz Ergin
41
3
0
20 Nov 2022
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Niclas Kühnapfel
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Christian Werling
Jean-Pierre Seifert
26
6
0
20 Sep 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
93
4
0
20 Apr 2022
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Aakash Tyagi
Addison Crump
A. Sadeghi
Garrett Persyn
Jeyavijayan Rajendran
Patrick Jauernig
Rahul Kande
69
66
0
24 Jan 2022
Secure Remote Attestation with Strong Key Insulation Guarantees
Deniz Gurevin
Chenglu Jin
Phuong Ha Nguyen
O. Khan
Marten van Dijk
32
4
0
05 Jan 2022
Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults
Rihui Sun
Pefei Qiu
Yongqiang Lyu
Donsheng Wang
Jiang Dong
Gang Qu
65
5
0
07 Dec 2021
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
49
3
0
21 Nov 2021
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Adnan Siraj Rakin
Md Hafizul Islam Chowdhuryy
Fan Yao
Deliang Fan
AAML
MIACV
81
117
0
08 Nov 2021
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Ghada Dessouky
Alexander Gruler
Pouya Mahmoody
A. Sadeghi
Emmanuel Stapf
77
24
0
15 Oct 2021
Garmr: Defending the gates of PKU-based sandboxing
Alexios Voulimeneas
Jonas Vinck
Ruben Mechelinck
Stijn Volckaert
18
0
0
10 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILM
AAML
77
10
0
23 Sep 2021
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
64
63
0
10 Aug 2021
Scrooge Attack: Undervolting ARM Processors for Profit
Christian Gottel
K. Parasyris
O. Unsal
Pascal Felber
Marcelo Pasin
V. Schiavoni
35
2
0
01 Jul 2021
Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data Collection using Trusted Execution Environment (TEE)
Chunchi Liu
Hechuan Guo
Minghui Xu
Shengling Wang
Dongxiao Yu
Jiguo Yu
Xiuzhen Cheng
92
42
0
30 Jun 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
49
10
0
07 May 2021
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier
J. Dutertre
Yannick Teglia
Philippe Loubet-Moundi
14
12
0
16 Sep 2020
Artificial Neural Networks and Fault Injection Attacks
Shahin Tajik
F. Ganji
SILM
66
11
0
17 Aug 2020
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
Yang Liu
75
53
0
23 Feb 2020
1