Security Risks and Innovations in Emerging Technologies

The field of computer security is rapidly evolving, with new threats and vulnerabilities emerging in various areas, including side-channel attacks, trusted execution environments, and underwater communication systems. Recent research has highlighted the susceptibility of large language models to cache side-channel attacks, which can lead to significant information leakage. Additionally, advanced Rowhammer techniques have been shown to bypass existing hardware defenses, enabling efficient cryptographic signature correction attacks and targeted attacks against large language models. On the other hand, innovative solutions such as attestable builds and Rollbaccine have been proposed to provide strong source-to-binary correspondence and rollback resistance in software artifacts. Noteworthy papers include Spill The Beans, which demonstrates the feasibility of leaking tokens from large language models via cache side-channels, and Rubber Mallet, which presents a study of high frequency localized bit flips and their impact on security. Furthermore, the paper Attestable builds introduces a new paradigm for compiling verifiable binaries on untrusted systems using trusted execution environments. The field is also exploring new areas, such as acoustic side-channel attacks on computer mice and the vulnerability of underwater magnetic induction communication to eavesdropping attacks. Overall, the field is moving towards a deeper understanding of emerging threats and the development of innovative solutions to mitigate them.

Sources

Spill The Beans: Exploiting CPU Cache Side-Channels to Leak Tokens from Large Language Models

Rubber Mallet: A Study of High Frequency Localized Bit Flips and Their Impact on Security

Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments

Acoustic Side-Channel Attacks on a Computer Mouse

Rollbaccine : Herd Immunity against Storage Rollback Attacks in TEEs [Technical Report]

On the Vulnerability of Underwater Magnetic Induction Communication

Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory

Dynamic Precoding for Near-Field Secure Communications: Implementation and Performance Analysis

An Agent-Based Modeling Approach to Free-Text Keyboard Dynamics for Continuous Authentication

Built with on top of