| 1 |
Spectre Attacks: Exploiting Speculative Execution |
4024 |
2019 |
| 2 |
Meltdown: Reading Kernel Memory from User Space |
3242 |
2018 |
| 3 |
Flush+Flush: A Fast and Stealthy Cache Attack |
969 |
2016 |
| 4 |
ZombieLoad: Cross-Privilege-Boundary Data Sampling |
706 |
2019 |
| 5 |
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches |
703 |
2015 |
| 6 |
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks |
697 |
2016 |
| 7 |
A Systematic Evaluation of Transient Execution Attacks and Defenses |
677 |
2019 |
| 8 |
ARMageddon: Cache Attacks on Mobile Devices |
671 |
2016 |
| 9 |
Malware Guard Extension: Using SGX to Conceal Cache Attacks |
656 |
2017 |
| 10 |
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript |
654 |
2016 |
| 11 |
Plundervolt: Software-based Fault Injection Attacks against Intel SGX |
589 |
2020 |
| 12 |
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms |
542 |
2016 |
| 13 |
Fallout: Leaking data on meltdown-resistant cpus |
531 |
2019 |
| 14 |
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection |
430 |
2020 |
| 15 |
Another Flip in the Wall of Rowhammer Defenses |
401 |
2018 |
| 16 |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR |
396 |
2016 |
| 17 |
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory |
372 |
2017 |
| 18 |
KASLR is Dead: Long Live KASLR |
371 |
2017 |
| 19 |
NetSpectre: Read Arbitrary Memory over Network |
361 |
2019 |
| 20 |
PLATYPUS: Software-based Power Side-Channel Attacks on x86 |
361 |
2021 |
| 21 |
Rambleed: Reading bits in memory without accessing them |
335 |
2020 |
| 22 |
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization |
317 |
2019 |
| 23 |
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud |
246 |
2017 |
| 24 |
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript |
214 |
2017 |
| 25 |
Nethammer: Inducing Rowhammer Faults through Network Requests |
207 |
2020 |
| 26 |
ConTExT: A Generic Approach for Mitigating Spectre |
168 |
2020 |
| 27 |
Donky: Domain KeysâEfficient In-Process Isolation for RISC-V and x86 |
163 |
2020 |
| 28 |
Practical enclave malware with Intel SGX |
146 |
2019 |
| 29 |
Systematic Analysis of Randomization-based Protected Cache Architectures |
136 |
2021 |
| 30 |
Half-Double: Hammering From the Next Row Over |
132 |
2022 |