| skipped 225 lines |
226 | 226 | | # Microarchitectural attacks applied to TEE |
227 | 227 | | |
228 | 228 | | - ARMageddon: Cache attacks on mobile devices |
229 | | - | - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_lipp.pdf |
| 229 | + | - [Paper] https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_lipp.pdf |
| 230 | + | - [Related tool] https://github.com/IAIK/armageddon |
230 | 231 | | |
231 | 232 | | - Cache storage channels: Alias-driven attacks and verified countermeasures. |
232 | 233 | | - https://www.kth.se/polopoly_fs/1.641701.1550155969!/R.Guanciale.pdf |
233 | 234 | | |
234 | 235 | | - 34C3 - Microarchitectural Attacks on Trusted Execution Environments |
235 | 236 | | - https://media.ccc.de/v/34c3-8950-microarchitectural_attacks_on_trusted_execution_environments |
| 237 | + | |
| 238 | + | - TruSpy: Cache side-channel information leakage from the secure world on ARM devices |
| 239 | + | - https://eprint.iacr.org/2016/980.pdf |
236 | 240 | | |
237 | 241 | | |
238 | 242 | | # Tools |
| skipped 40 lines |