Useful Links
1. Foundations of Microarchitectural Security
2. Cache-Based Side Channel Attacks
3. Transient Execution Attacks
4. Specialized Microarchitectural Attacks
5. Attack Methodology and Implementation
6. Defense and Mitigation Strategies
7. Advanced Topics and Future Directions
  1. Computer Science
  2. Cybersecurity

Microarchitectural Attacks and Security

1. Foundations of Microarchitectural Security
2. Cache-Based Side Channel Attacks
3. Transient Execution Attacks
4. Specialized Microarchitectural Attacks
5. Attack Methodology and Implementation
6. Defense and Mitigation Strategies
7. Advanced Topics and Future Directions
  1. Specialized Microarchitectural Attacks
    1. DRAM-Based Attacks
      1. Rowhammer Fundamentals
        1. DRAM Cell Structure and Operation
          1. Charge Leakage and Disturbance
            1. Row Activation Patterns
            2. Rowhammer Attack Techniques
              1. Double-Sided Rowhammer
                1. Single-Sided Rowhammer
                  1. One-Location Hammering
                  2. Rowhammer Exploitation
                    1. Bit Flip Detection
                      1. Privilege Escalation Techniques
                        1. Page Table Manipulation
                          1. Cryptographic Key Corruption
                          2. Advanced DRAM Attacks
                            1. TRRespass (Many-Sided Rowhammer)
                              1. RAMBleed (Data Reading via Rowhammer)
                            2. Port Contention Attacks
                              1. Execution Port Architecture
                                1. SMT Resource Sharing Exploitation
                                  1. Port Contention Measurement
                                    1. Data Inference from Contention Patterns
                                    2. Translation Lookaside Buffer Attacks
                                      1. TLBleed Attack Mechanism
                                        1. TLB State Observation
                                          1. Address Translation Leakage
                                            1. Cross-Process TLB Attacks
                                            2. Secure Enclave Attacks
                                              1. Intel SGX Attack Surface
                                                1. SGAxe Cache-Based Attacks
                                                  1. Enclave Memory Layout Inference
                                                    1. Attestation and Sealing Attacks
                                                    2. Network-Based Microarchitectural Attacks
                                                      1. NetSpectre Remote Timing
                                                        1. Network Timing Side Channels
                                                          1. Remote Cache Attacks
                                                            1. Amplification Techniques

                                                          Previous

                                                          3. Transient Execution Attacks

                                                          Go to top

                                                          Next

                                                          5. Attack Methodology and Implementation

                                                          © 2025 Useful Links. All rights reserved.

                                                          About•Bluesky•X.com