Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption
Wei Peng
34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Hardware Security 3: Side-Channel and Fault Injection Attacks
Wei Peng
34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Hardware Security 3: Side-Channel and Fault Injection Attacks