Skip to content

Commit

Permalink
Merge pull request #37 from dn0sar/readme_pull_request
Browse files Browse the repository at this point in the history
Updated README \w Frontal Attack publication links
  • Loading branch information
jovanbulck authored Aug 13, 2021
2 parents 56ec2ad + 3e42a8e commit e4cc283
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -303,7 +303,7 @@ a pull request if your project uses SGX-Step but is not included below.
| Title | Publication details | Source code | SGX-Step features used |
|-------|---------------------|-------------|------------------------|
| CrossTalk: Speculative Data Leaks Across Cores Are Real | [S&P21](https://download.vusec.net/papers/crosstalk_sp21.pdf) | - | Single-stepping, page fault |
| Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend | [arXiv20](https://arxiv.org/pdf/2005.11516.pdf) | - | Single-stepping interrupt latency, PTE A/D |
| Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend | [USEC21](https://www.usenix.org/system/files/sec21-puddu.pdf) | [link](https://github.com/dn0sar/frontal_poc) | Single-stepping interrupt latency, PTE A/D |
| From A to Z: Projective coordinates leakage in the wild | [CHES20](https://eprint.iacr.org/2020/432.pdf) | - | Page fault |
| LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection | [S&P20](https://lviattack.eu/lvi.pdf) | [link](https://github.com/jovanbulck/sgx-step-lvi/tree/master/app/lvi) | Single-stepping, page-table manipulation |
| CopyCat: Controlled Instruction-Level Attacks on Enclaves | [USEC20](https://arxiv.org/pdf/2002.08437.pdf) | - | Single-stepping, page fault, PTE A/D |
Expand Down

0 comments on commit e4cc283

Please sign in to comment.