MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking. Kovats, T., Solt, F., Ceesay-Seitz, K., & Razavi, K. In CCS, October, 2025.
Paper
URL bibtex 113 downloads @inproceedings{kovats_milesan_2025,
title = {{MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking}},
url = {Paper=https://comsec-files.ethz.ch/papers/milesan_ccs25.pdf URL=https://comsec.ethz.ch/milesan},
booktitle = {{CCS}},
author = {Kovats, Tobias and Solt, Flavien and Ceesay-Seitz, Katharina and Razavi, Kaveh},
month = oct,
year = {2025},
keywords = {dir\_designsec, proj\_promise, type\_tier1}
}
Downloads: 113
{"_id":"4jm97nQg3EftpcaJo","bibbaseid":"kovats-solt-ceesayseitz-razavi-milesandetectingexploitablemicroarchitecturalleakageviadifferentialhardwaresoftwaretainttracking-2025","author_short":["Kovats, T.","Solt, F.","Ceesay-Seitz, K.","Razavi, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking","booktitle":"CCS","author":[{"propositions":[],"lastnames":["Kovats"],"firstnames":["Tobias"],"suffixes":[]},{"propositions":[],"lastnames":["Solt"],"firstnames":["Flavien"],"suffixes":[]},{"propositions":[],"lastnames":["Ceesay-Seitz"],"firstnames":["Katharina"],"suffixes":[]},{"propositions":[],"lastnames":["Razavi"],"firstnames":["Kaveh"],"suffixes":[]}],"month":"October","year":"2025","keywords":"dir_designsec, proj_promise, type_tier1","bibtex":"@inproceedings{kovats_milesan_2025,\n\ttitle = {{MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking}},\n\turl = {Paper=https://comsec-files.ethz.ch/papers/milesan_ccs25.pdf URL=https://comsec.ethz.ch/milesan},\n\tbooktitle = {{CCS}},\n\tauthor = {Kovats, Tobias and Solt, Flavien and Ceesay-Seitz, Katharina and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2025},\n\tkeywords = {dir\\_designsec, proj\\_promise, type\\_tier1}\n}\n\n","author_short":["Kovats, T.","Solt, F.","Ceesay-Seitz, K.","Razavi, K."],"urlPaper":"https://comsec-files.ethz.ch/papers/milesan_ccs25.pdf","urlURL":"https://comsec.ethz.ch/milesan","key":"kovats_milesan_2025","id":"kovats_milesan_2025","bibbaseid":"kovats-solt-ceesayseitz-razavi-milesandetectingexploitablemicroarchitecturalleakageviadifferentialhardwaresoftwaretainttracking-2025","role":"author","urls":{"Paper":"https://comsec-files.ethz.ch/papers/milesan_ccs25.pdf","URL":"https://comsec.ethz.ch/milesan"},"keyword":["dir_designsec","proj_promise","type_tier1"],"metadata":{"authorlinks":{}},"downloads":113,"html":""},"bibtype":"inproceedings","biburl":"comsec.ethz.ch/wp-content/files/bibtex.bib","dataSources":["pZypef47MfN3TyDAm","qCFv6rqGiCEEc8vwf","GXZDscnxRKcSqpjq7","YGakxmz3J6khh9GMY","Xy8iTfv6A3D2wALgZ","YypkWwoJGZmJmmbWZ","Pnw9yXHBhNfHBXALR","5XuMQ2rv9KEsbws3h","xRNmdkux2Byheaqzn","8QwvH7maHJSXTZpvH"],"keywords":["dir_designsec","proj_promise","type_tier1"],"search_terms":["milesan","detecting","exploitable","microarchitectural","leakage","via","differential","hardware","software","taint","tracking","kovats","solt","ceesay-seitz","razavi"],"title":"MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking","year":2025,"downloads":113}