BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation H Wang, M Tang, K Xu, Q Wang arXiv preprint arXiv:2306.01996, 2023 | 2 | 2023 |
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones Q Wang, M Tang, J Fu IEEE Internet of Things Journal 11 (3), 3979--3993, 2024 | 1 | 2024 |
BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions Q Wang, X Zhang, H Wang, Y Gu, M Tang arXiv preprint arXiv:2304.10268, 2023 | 1 | 2023 |
Exploitation of Security Vulnerability on Retirement K Xu, M Tang, Q Wang, H Wang 2024 IEEE International Symposium on High-Performance Computer Architecture …, 2024 | | 2024 |
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities Q Wang, M Tang, K Xu, H Wang 2024 IEEE International Symposium on High-Performance Computer Architecture …, 2024 | | 2024 |
One more set: Mitigating conflict-based cache side-channel attacks by extending cache set Y Gu, M Tang, Q Wang, H Wang, H Ding Journal of Systems Architecture 144, 102997, 2023 | | 2023 |
New Covert and Side Channels Based on Retirement K Xu, M Tang, Q Wang, H Wang arXiv preprint arXiv:2307.12486, 2023 | | 2023 |