Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory EncryptionWei Peng, Yinshuai Li, and Yinqian Zhang.34th USENIX Security Symposium (USENIX Security '25).Official page here. Paper PDF here. Appendix here.Share on Twitter Facebook LinkedIn Previous Next