All Stories

  1. Arm Weak Memory Consistency on Apple Silicon: What Is It Good For?
  2. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud
  3. Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS
  4. Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures
  5. Database Data Protected By Row-Level Security Can Be Revealed by Analyzing Query Execution Times
  6. WISE
  7. Evaluating compressed indexes in DBMS
  8. System-level crash safe sorting on persistent memory
  9. Pinned loads: taming speculative loads in secure processors
  10. The benefits of general-purpose on-NIC memory
  11. Opening Pandora’s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data
  12. Autonomous NIC offloads
  13. Speculative interference attacks: breaking invisible speculation schemes
  14. Proving highly-concurrent traversals correct
  15. Snug
  16. V-Combiner
  17. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution
  18. InvisiSpec
  19. Speculative Taint Tracking (STT)
  20. DAMN