ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.08437
  4. Cited By
CopyCat: Controlled Instruction-Level Attacks on Enclaves
v1v2v3 (latest)

CopyCat: Controlled Instruction-Level Attacks on Enclaves

19 February 2020
D. Moghimi
Jo Van Bulck
N. Heninger
Frank Piessens
B. Sunar
ArXiv (abs)PDFHTML

Papers citing "CopyCat: Controlled Instruction-Level Attacks on Enclaves"

20 / 20 papers shown
Title
FARFETCH'D: A Side-Channel Analysis Framework for Privacy Applications on Confidential Virtual Machines
FARFETCH'D: A Side-Channel Analysis Framework for Privacy Applications on Confidential Virtual Machines
Ruiyi Zhang
Albert Cheu
Adria Gascon
D. Moghimi
Phillipp Schoppmann
Michael Schwarz
Octavian Suciu
FedML
20
0
0
18 Jun 2025
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
MD Mahady Hassan
Shanto Roy
Reza Rahaeimehr
67
0
0
08 May 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
79
0
0
05 Sep 2024
QuanShield: Protecting against Side-Channels Attacks using
  Self-Destructing Enclaves
QuanShield: Protecting against Side-Channels Attacks using Self-Destructing Enclaves
Shujie Cui
Haohua Li
Yuanhong Li
Zhi Zhang
Lluís Vilanova
Peter Pietzuch
151
0
0
19 Dec 2023
Assume but Verify: Deductive Verification of Leaked Information in
  Concurrent Applications (Extended Version)
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)
Toby C. Murray
Mukesh Tiwari
G. Ernst
David A. Naumann
105
0
0
07 Sep 2023
SEV-Step: A Single-Stepping Framework for AMD-SEV
SEV-Step: A Single-Stepping Framework for AMD-SEV
Luca Wilke
Jan Wichelmann
Anja Rabich
T. Eisenbarth
76
19
0
27 Jul 2023
TimeClave: Oblivious In-enclave Time series Processing System
TimeClave: Oblivious In-enclave Time series Processing System
K. Bagher
S. Cui
X. Yuan
Carsten Rudolph
X. Yi
AI4TS
49
0
0
29 Jun 2023
On (the Lack of) Code Confidentiality in Trusted Execution Environments
On (the Lack of) Code Confidentiality in Trusted Execution Environments
Ivan Puddu
Moritz Schneider
Daniele Lain
Stefano Boschetto
Srdjan Čapkun
69
10
0
15 Dec 2022
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Jan Wichelmann
Anna Pätschke
Luca Wilke
T. Eisenbarth
44
15
0
24 Oct 2022
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities
  in Production Software
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
Yuanyuan Yuan
Zhibo Liu
Shuai Wang
67
12
0
29 Sep 2022
Microwalk-CI: Practical Side-Channel Analysis for JavaScript
  Applications
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications
Jan Wichelmann
Florian Sieck
Anna Pätschke
T. Eisenbarth
67
22
0
31 Aug 2022
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Zhihao Yao
S. Talebi
M. Chen
A. A. Sani
Thomas Anderson
50
1
0
15 Mar 2022
Util::Lookup: Exploiting key decoding in cryptographic libraries
Util::Lookup: Exploiting key decoding in cryptographic libraries
Florian Sieck
Sebastian Berndt
Jan Wichelmann
T. Eisenbarth
38
17
0
10 Aug 2021
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Luca Wilke
Jan Wichelmann
Florian Sieck
T. Eisenbarth
50
18
0
29 Jun 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
49
10
0
07 May 2021
Constantine: Automatic Side-Channel Resistance Using Efficient Control
  and Data Flow Linearization
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
79
54
0
21 Apr 2021
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and
  Defenses in Cryptography
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography
Xiaoxuan Lou
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
70
92
0
26 Mar 2021
On the Challenges of Detecting Side-Channel Attacks in SGX
On the Challenges of Detecting Side-Channel Attacks in SGX
Jianyu Jiang
Claudio Soriente
Ghassan O. Karame
AAML
49
10
0
30 Nov 2020
CACHE SNIPER : Accurate timing control of cache evictions
CACHE SNIPER : Accurate timing control of cache evictions
Samira Briongos
Ida Bruhns
Pedro Malagón
T. Eisenbarth
Jose M. Moya
39
1
0
27 Aug 2020
Online Template Attacks: Revisited
Online Template Attacks: Revisited
Alejandro Cabrera Aldaya
B. Brumley
AAML
38
9
0
10 Jul 2020
1