{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T19:08:52Z","timestamp":1776798532656,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484779","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2875-2889","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"],"prefix":"10.1145","author":[{"given":"Robert","family":"Buhren","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin - SECT, Berlin, Germany"}]},{"given":"Hans-Niklas","family":"Jacob","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - SECT, Berlin, Germany"}]},{"given":"Thilo","family":"Krachenfels","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - SECT, Berlin, Germany"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - SECT &amp; Fraunhofer SIT, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Advanced Micro Devices Inc. 2018. Understanding Power Management and Processor Performance Determinism. Retrieved 2021-04-06 from https:\/\/www.amd.com\/system\/files\/documents\/understanding-power-management.pdf"},{"key":"e_1_3_2_2_2_1","unstructured":"Advanced Micro Devices Inc. 2020. AMD Secure Encrypted Virtualization API Version 0.24. Retrieved 2021-03--26 from https:\/\/www.amd.com\/system\/files\/TechDocs\/55766_SEV-KM_API_Specification.pdf"},{"key":"e_1_3_2_2_3_1","unstructured":"Advanced Micro Devices Inc. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. Retrieved 2021-04-07 from https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf"},{"key":"e_1_3_2_2_4_1","unstructured":"Advanced Micro Devices Inc. 2021. AMD CEK Certificate Server. Retrieved 2021-04--16 from https:\/\/kdsintf.amd.com\/cek\/"},{"key":"e_1_3_2_2_5_1","unstructured":"Advanced Micro Devices Inc. 2021. AMD Milan Root Key. Retrieved 2021-04--16 from https:\/\/developer.amd.com\/wp-content\/resources\/ask_ark_milan.cert"},{"key":"e_1_3_2_2_6_1","unstructured":"Advanced Micro Devices Inc. 2021. AMD VCEK Certificate Server. Retrieved 2021-04--16 from https:\/\/kdsintf.amd.com\/vcek\/"},{"key":"e_1_3_2_2_7_1","unstructured":"Advanced Micro Devices Inc. 2021. SEV firmware for ROME. Retrieved 2021-04--16 from https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/amd_sev_fam17h_model3xh_0.24b0A.tar.gz"},{"key":"e_1_3_2_2_8_1","unstructured":"Advanced Micro Devices Inc. 2021. SEV Secure Nested Paging - Firmware ABI Specification Revision 0.9. Retrieved 2021-05-03 from https:\/\/www.amd.com\/system\/files\/TechDocs\/56860.pdf"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology. 2013. Digital Signature Standard (DSS). https:\/\/doi.org\/10.6028\/NIST.FIPS.186--4","DOI":"10.6028\/NIST.FIPS.186--4"},{"key":"e_1_3_2_2_10_1","unstructured":"Tamas Ban. 2020. Arm Ltd.: Trusted Firmware M. Retrieved 2021-04--25 from https:\/\/www.trustedfirmware.org\/docs\/TF-M_fault_injection_mitigation.pdf"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_2_12_1","unstructured":"Jeremy Boone. 2020. There's A Hole In Your SoC: Glitching The MediaTek BootROM. https:\/\/research.nccgroup.com\/2020\/10\/15\/theres-a-hole-in-your-soc-glitching-the-mediatek-bootrom\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Daniel R. L. Brown. 2010. SEC 2: Recommended Elliptic Curve Domain Parameters Version 2.0. https:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"e_1_3_2_2_14_1","unstructured":"Robert Buhren Alexander Eichner and Christian Werling. 2019. Uncover Understand Own - Regaining Control Over Your AMD CPU. Retrieved 2021-01--14 from https:\/\/media.ccc.de\/v\/36c3--10942-uncover_understand_own_-_regaining_control_over_your_amd_cpu"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354216"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"Lily Chen. 2009. Recommendation for Key Derivation Using Pseudorandom Functions (Revised). https:\/\/doi.org\/10.6028\/NIST.SP.800--108","DOI":"10.6028\/NIST.SP.800--108"},{"key":"e_1_3_2_2_17_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Chen Zitai","unstructured":"Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D. Garcia. 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Vancouver, B.C. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/chen-zitai"},{"key":"e_1_3_2_2_18_1","unstructured":"The MITRE Corporation. 2019. CVE-2019--9836. Retrieved 2021-04--19 from http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019--9836"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2006.1708651"},{"key":"e_1_3_2_2_20_1","unstructured":"Zhao-Hui Du Zhiwei Ying Zhenke Ma Yufei Mai Phoebe Wang Jesse Liu and Jesse Fang. 2017. Secure Encrypted Virtualization is Unsecure. (2017). arXiv:1712.05090"},{"key":"e_1_3_2_2_21_1","unstructured":"Andreas Galauner. 2018. Glitching the Switch. Retrieved 2021-03--15 from https:\/\/media.ccc.de\/v\/c4.openchaos.2018.06.glitching-the-switch"},{"key":"e_1_3_2_2_22_1","unstructured":"Gianluca Pacchiella. 2021. Gipi\/Low-Level: Hardware | Glitching. Retrieved 2021-04--14 from https:\/\/github.com\/gipi\/low-level\/blob\/master\/docs\/security\/hardware.md#glitching"},{"key":"e_1_3_2_2_23_1","unstructured":"Trusted Computing Group. 2021. TCGTrusted Platform Architecture Hardware Requirements for a Device Identifier Composition Engine. Retrieved 2021-05-04 from https:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/Device-Identifier-Composition-Engine-Rev69_Public-Review.pdf"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050763"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.79"},{"key":"e_1_3_2_2_26_1","unstructured":"International Rectifier. 2015. IR35201 8+0\/7+1\/6+2 Dual Output Digital Multi-Phase Controller. Retrieved 2021-04--19 from https:\/\/www.infineon.com\/dgdl\/Infineon-IR35201MTRPBF-DS-v01_00-EN.pdf ?fileId=5546d462576f347501579c95d19772b5"},{"key":"e_1_3_2_2_27_1","unstructured":"International Rectifier. 2016. IR35204 3+1 Dual Output Digital Multi-Phase Controller. Retrieved 2021-04--19 from https:\/\/www.infineon.com\/dgdl\/Infineon-IR35204MTRPBF-DS-v01_00-EN.pdf ?fileId=5546d462576f347501579c95e21172b9"},{"key":"e_1_3_2_2_28_1","unstructured":"Hans Niklas Jacob and Robert Buhren. 2021. Glitching the AMD Secure Processor. Retrieved 2021-08--26 from https:\/\/github.com\/PSPReverse\/amd-sp-glitch"},{"key":"e_1_3_2_2_29_1","unstructured":"David Kaplan. 2017. Protecting VM Register State with SEV-ES. Retrieved 2021-04-07 from https:\/\/www.amd.com\/system\/files\/TechDocs\/Protecting%20VM%20Register%20State%20with%20SEV-ES.pdf"},{"key":"e_1_3_2_2_30_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. Retrieved 2021-04-07 from https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf"},{"key":"e_1_3_2_2_31_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0LTpwn: Attacking X86 Processor Integrity from Software. In 29th USENIX Security Symposium (USENIX Security 20). 1445--1461."},{"key":"e_1_3_2_2_32_1","unstructured":"Roger Lai. 2013. AMD Security and Server innovation. Retrieved 2021-03--26 from https:\/\/uefi.org\/sites\/default\/files\/resources\/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"},{"key":"e_1_3_2_2_33_1","unstructured":"Thomas Lendacky and Gary Hook. 2021. CCP Linux kernel driver. Retrieved 2021-05-04 from https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/tree\/drivers\/crypto\/ccp\/"},{"key":"e_1_3_2_2_34_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Li Mengyuan","year":"2019","unstructured":"Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting Unprotected I\/O Operations in AMD's Secure Encrypted Virtualization. In 28th USENIX Security Symposium (USENIX Security 19). 1257--1272. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/li-mengyuan"},{"key":"e_1_3_2_2_35_1","volume-title":"Injecting Software Vulnerabilities with Voltage Glitching. (Feb","author":"Yifan Lu.","year":"2019","unstructured":"Yifan Lu. 2019. Injecting Software Vulnerabilities with Voltage Glitching. (Feb. 2019). arXiv:1903.08102 [cs]"},{"key":"e_1_3_2_2_36_1","unstructured":"Akash Malhotra. 2020. Full-stack Multilayered Security Features for a Changing World. Retrieved 2021-03--26 from https:\/\/www.amd.com\/system\/files\/documents\/ryzen-pro-article-multilayered-security-features.pdf"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00063"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2990495"},{"key":"e_1_3_2_2_41_1","unstructured":"Colin O'Flynn. 2016. Fault Injection Using Crowbars on Embedded Systems. IACR Cryptol. ePrint Arch. (2016). https:\/\/eprint.iacr.org\/2016\/810"},{"key":"e_1_3_2_2_42_1","unstructured":"PJRC. 2021. Teensy\u00ae4.0 Development Board. Retrieved 2021-04-01 from https:\/\/www.pjrc.com\/store\/teensy40.html"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","unstructured":"P. Qiu D. Wang Y. Lyu R. Tian C. Wang and G. Qu. 2020. VoltJockey: A New Dynamic Voltage Scaling Based Fault Injection Attack on Intel SGX. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2020) 1--1. https:\/\/doi.org\/10.1109\/TCAD.2020.3024853","DOI":"10.1109\/TCAD.2020.3024853"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433667.3433668"},{"key":"e_1_3_2_2_45_1","unstructured":"Kedar Rajpathak and Tezaswi Raja. 2020. Cross Domain Voltage Glitch Detection Circuit for Enhancing Chip Security. Retrieved 2021-03--11 from https:\/\/patents.google.com\/patent\/US20200285780A1\/en"},{"key":"e_1_3_2_2_46_1","unstructured":"Renesas Electronics Corporation. 2020. ISL62776 Multiphase PWM Regulator for AMD CPUs Using SVI2. Retrieved 2021-04--19 from https:\/\/www.renesas.com\/us\/en\/document\/dst\/isl62776-datasheet"},{"key":"e_1_3_2_2_47_1","unstructured":"Richtek Technology Corporation. 2019. Dual-Output PWM Controller for AMD SVI2 CPU Power Supply. Retrieved 2021-04--19 from https:\/\/www.richtek.com\/assets\/product_file\/RT3667BT\/DS3667BT-00.pdf"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.28"},{"key":"e_1_3_2_2_49_1","unstructured":"Texas Instruments. 2016. SN74LVC07A Hex Buffer and Driver with Open-Drain Outputs. Retrieved 2021-04--19 from https:\/\/www.ti.com\/lit\/ds\/symlink\/sn74lvc07a.pdf"},{"key":"e_1_3_2_2_50_1","unstructured":"the coreboot project. 2021. AMD Platform Security Processor (PSP) Firmware Integration Guide. Retrieved 2021-08--24 from https:\/\/doc.coreboot.org\/soc\/amd\/psp_integration.html"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.18"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--41702--4_8"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-021-00259--6"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329820"},{"key":"e_1_3_2_2_55_1","unstructured":"WikiChip. 2020. Socket AM4 -- Packages -- AMD. Retrieved 2021-04-01 from https:\/\/en.wikichip.org\/wiki\/amd\/packages\/socket_am4#Pin_Map"},{"key":"e_1_3_2_2_56_1","unstructured":"WikiChip. 2020. Socket SP3 -- Packages -- AMD. Retrieved 2021-04-01 from https:\/\/en.wikichip.org\/wiki\/amd\/packages\/socket_sp3#Pin_Map"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00080"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00064"},{"key":"e_1_3_2_2_59_1","volume-title":"Riscure: Secure Application Programming in the Presence of Side Channel Attacks. Retrieved 2021-04--18 from https:\/\/www.riscure.com\/uploads\/2018\/11\/201708_Riscure_Whitepaper_Side_Channel_Patterns.pdf","author":"Witteman Marc","year":"2018","unstructured":"Marc Witteman. 2018. Riscure: Secure Application Programming in the Presence of Side Channel Attacks. Retrieved 2021-04--18 from https:\/\/www.riscure.com\/uploads\/2018\/11\/201708_Riscure_Whitepaper_Side_Channel_Patterns.pdf"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:46Z","timestamp":1763499166000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":59,"alternative-id":["10.1145\/3460120.3484779","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484779","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}