All Stories

  1. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud
  2. Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS
  3. Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures
  4. Database Data Protected By Row-Level Security Can Be Revealed by Analyzing Query Execution Times
  5. WISE
  6. Evaluating compressed indexes in DBMS
  7. System-level crash safe sorting on persistent memory
  8. Pinned loads: taming speculative loads in secure processors
  9. The benefits of general-purpose on-NIC memory
  10. Opening Pandora’s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data
  11. Autonomous NIC offloads
  12. Speculative interference attacks: breaking invisible speculation schemes
  13. Proving highly-concurrent traversals correct
  14. Snug
  15. V-Combiner
  16. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution
  17. InvisiSpec
  18. Speculative Taint Tracking (STT)
  19. DAMN