Useful Links
Computer Science
Cybersecurity
Microarchitectural Attacks and Security
1. Foundations of Microarchitectural Security
2. Cache-Based Side Channel Attacks
3. Transient Execution Attacks
4. Specialized Microarchitectural Attacks
5. Attack Methodology and Implementation
6. Defense and Mitigation Strategies
7. Advanced Topics and Future Directions
Specialized Microarchitectural Attacks
DRAM-Based Attacks
Rowhammer Fundamentals
DRAM Cell Structure and Operation
Charge Leakage and Disturbance
Row Activation Patterns
Rowhammer Attack Techniques
Double-Sided Rowhammer
Single-Sided Rowhammer
One-Location Hammering
Rowhammer Exploitation
Bit Flip Detection
Privilege Escalation Techniques
Page Table Manipulation
Cryptographic Key Corruption
Advanced DRAM Attacks
TRRespass (Many-Sided Rowhammer)
RAMBleed (Data Reading via Rowhammer)
Port Contention Attacks
Execution Port Architecture
SMT Resource Sharing Exploitation
Port Contention Measurement
Data Inference from Contention Patterns
Translation Lookaside Buffer Attacks
TLBleed Attack Mechanism
TLB State Observation
Address Translation Leakage
Cross-Process TLB Attacks
Secure Enclave Attacks
Intel SGX Attack Surface
SGAxe Cache-Based Attacks
Enclave Memory Layout Inference
Attestation and Sealing Attacks
Network-Based Microarchitectural Attacks
NetSpectre Remote Timing
Network Timing Side Channels
Remote Cache Attacks
Amplification Techniques
Previous
3. Transient Execution Attacks
Go to top
Next
5. Attack Methodology and Implementation