Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption

Wei Peng, Yinshuai Li, and Yinqian Zhang.

34th USENIX Security Symposium (USENIX Security '25).

Official page here. Paper PDF here. Appendix here.