Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Transient-execution attacks: A computer architect perspective
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
Specification and verification of side-channel security for open-source processors via leakage contracts
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …
Pensieve: Microarchitectural modeling for security evaluation
Traditional modeling approaches in computer architecture aim to obtain an accurate
estimation of performance, area, and energy of a processor design. With the advent of …
estimation of performance, area, and energy of a processor design. With the advent of …
Design of Access Control Mechanisms in {Systems-on-Chip} with Formal Integrity Guarantees
Many SoCs employ system-level hardware access control mechanisms to ensure that
security-critical operations cannot be tampered with by less trusted components of the …
security-critical operations cannot be tampered with by less trusted components of the …
RTL verification for secure speculation using contract shadow logic
Modern out-of-order processors face speculative execution attacks. Despite various
proposed software and hardware mitigations to prevent such attacks, new attacks keep …
proposed software and hardware mitigations to prevent such attacks, new attacks keep …
Towards a formally verified hardware root-of-trust for data-oblivious computing
The importance of preventing microarchitectural timing side channels in security-critical
applications has surged immensely over the last several years. Constant-time programming …
applications has surged immensely over the last several years. Constant-time programming …
Specverilog: Adapting information flow control for secure speculation
To address transient execution vulnerabilities, processor architects have proposed both
defensive designs and formal descriptions of the security they provide. However, these …
defensive designs and formal descriptions of the security they provide. However, these …
[PDF][PDF] Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks
Transient execution vulnerabilities have affected CPUs for the better part of the decade, yet,
we are still missing methods to efficiently uncover them at the design stage. Existing …
we are still missing methods to efficiently uncover them at the design stage. Existing …
[PDF][PDF] H-Houdini: Scalable Invariant Learning
Formal verification is a critical task in hardware design today. Yet, while there has been
significant progress in improving technique automation and efficiency, scaling to large …
significant progress in improving technique automation and efficiency, scaling to large …
VeriCHERI: Exhaustive Formal Security Verification of CHERI at the RTL
Protecting data in memory from attackers continues to be a concern in computing systems.
CHERI is a promising approach to achieve such protection, by providing and enforcing fine …
CHERI is a promising approach to achieve such protection, by providing and enforcing fine …