{"id":"https://openalex.org/W4288057728","doi":"https://doi.org/10.1109/sp46214.2022.9833768","title":"A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP","display_name":"A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4288057728","doi":"https://doi.org/10.1109/sp46214.2022.9833768"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833768","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833768","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100415393","display_name":"Mengyuan Li","orcid":"https://orcid.org/0000-0001-5526-3228"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengyuan Li","raw_affiliation_strings":["The Ohio State University"],"affiliations":[{"raw_affiliation_string":"The Ohio State University","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076679616","display_name":"Luca Wilke","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luca Wilke","raw_affiliation_strings":["University of L&#x00FC;beck"],"affiliations":[{"raw_affiliation_string":"University of L&#x00FC;beck","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081651621","display_name":"Jan Wichelmann","orcid":"https://orcid.org/0000-0002-5748-5462"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jan Wichelmann","raw_affiliation_strings":["University of L&#x00FC;beck"],"affiliations":[{"raw_affiliation_string":"University of L&#x00FC;beck","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["University of L&#x00FC;beck"],"affiliations":[{"raw_affiliation_string":"University of L&#x00FC;beck","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091455049","display_name":"Radu Teodorescu","orcid":"https://orcid.org/0000-0002-6474-2201"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Radu Teodorescu","raw_affiliation_strings":["The Ohio State University"],"affiliations":[{"raw_affiliation_string":"The Ohio State University","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100415393"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":5.6603,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.96941912,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"337","last_page":"351"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7863985896110535},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7274436950683594},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5407204031944275},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.49156245589256287},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4455834925174713},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.42935624718666077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3872148096561432},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.386329710483551},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2639898359775543},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.2503933310508728},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.17827057838439941}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7863985896110535},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7274436950683594},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5407204031944275},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.49156245589256287},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4455834925174713},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.42935624718666077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3872148096561432},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.386329710483551},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2639898359775543},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2503933310508728},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.17827057838439941}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46214.2022.9833768","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833768","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1992291252","https://openalex.org/W2001759130","https://openalex.org/W2115148615","https://openalex.org/W2163005041","https://openalex.org/W2170138789","https://openalex.org/W2559981079","https://openalex.org/W2565033795","https://openalex.org/W2576037784","https://openalex.org/W2614094595","https://openalex.org/W2775584553","https://openalex.org/W2795160257","https://openalex.org/W2907416151","https://openalex.org/W2947886797","https://openalex.org/W2959284240","https://openalex.org/W3020133545","https://openalex.org/W3047916753","https://openalex.org/W3100785504","https://openalex.org/W3103974952","https://openalex.org/W3173474283","https://openalex.org/W3177645431","https://openalex.org/W3189814678","https://openalex.org/W3211385142","https://openalex.org/W3212271742","https://openalex.org/W4200623403","https://openalex.org/W4297740902","https://openalex.org/W6712237015","https://openalex.org/W6720892955","https://openalex.org/W6732215895","https://openalex.org/W6746810237","https://openalex.org/W6771327302","https://openalex.org/W6799842772"],"related_works":["https://openalex.org/W2355126378","https://openalex.org/W2146985619","https://openalex.org/W1988628032","https://openalex.org/W3029058925","https://openalex.org/W2587915807","https://openalex.org/W1536085039","https://openalex.org/W2096211577","https://openalex.org/W113132299","https://openalex.org/W2253961322","https://openalex.org/W4379014147"],"abstract_inverted_index":{"Hardware-assisted":[0],"memory":[1,106,151],"encryption":[2,159],"offers":[3],"strong":[4],"confidentiality":[5],"guarantees":[6],"for":[7,110],"trusted":[8],"execution":[9],"environments":[10],"like":[11],"Intel":[12],"SGX":[13],"and":[14,63,115,161,206],"AMD":[15,149,179,214],"SEV.":[16],"However,":[17],"a":[18,73,94,126,155,190],"recent":[19],"study":[20,75],"by":[21,49,178],"Li":[22],"et":[23],"al.":[24],"presented":[25],"at":[26],"USENIX":[27],"Security":[28],"2021":[29],"has":[30],"demonstrated":[31],"the":[32,40,50,66,77,86,91,101,123,133,136,146,162,167,170,175,182,185,196,203],"CipherLeaks":[33,87,124],"attack,":[34,125],"which":[35],"monitors":[36],"ciphertext":[37,78,96,102,134,168,197],"changes":[38,218],"in":[39,65,148],"special":[41],"VMSA":[42,92,137],"page.":[43],"By":[44],"leaking":[45],"register":[46],"values":[47],"saved":[48],"VM":[51],"during":[52],"context":[53],"switches,":[54],"they":[55],"broke":[56],"state-of-the-art":[57],"constant-time":[58],"cryptographic":[59,207],"implementations,":[60],"including":[61,108,200],"RSA":[62],"ECDSA":[64],"OpenSSL.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,188],"perform":[72],"comprehensive":[74],"on":[76],"side":[79,198],"channels.":[80],"Our":[81],"work":[82],"suggests":[83],"that":[84,129],"while":[85],"attack":[88,98],"targets":[89],"only":[90],"page,":[93,138],"generic":[95],"side-channel":[97],"may":[99],"exploit":[100],"leakage":[103,147],"from":[104,184],"any":[105],"pages,":[107],"those":[109],"kernel":[111,205],"data":[112],"structures,":[113],"stacks":[114],"heaps.":[116],"As":[117],"such,":[118],"AMD\u2019s":[119],"existing":[120],"countermeasures":[121,194],"to":[122,166,180,195,202,215],"firmware":[127],"patch":[128],"introduces":[130],"randomness":[131],"into":[132,219],"of":[135,145,154,169,192],"is":[139],"clearly":[140],"insufficient.":[141],"The":[142],"root":[143],"cause":[144],"SEV\u2019s":[150],"encryption\u2014the":[152],"use":[153],"stateless":[156],"yet":[157],"unauthenticated":[158],"mode":[160],"unrestricted":[163],"read":[164],"accesses":[165],"encrypted":[171],"memory\u2014remains":[172],"unfixed.":[173],"Given":[174],"challenges":[176],"faced":[177],"eradicate":[181],"vulnerability":[183],"hardware":[186],"design,":[187],"propose":[189],"set":[191],"software":[193],"channels,":[199],"patches":[201],"OS":[204],"libraries.":[208],"We":[209],"are":[210],"working":[211],"closely":[212],"with":[213],"merge":[216],"these":[217],"affected":[220],"open-source":[221],"projects.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
