Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Timing side-channel attacks and countermeasures in CPU microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
Transient-execution attacks: A computer architect perspective
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
WRITE+ SYNC: software cache write covert channels exploiting memory-disk synchronization
Memory-disk synchronization is a critical technology for ensuring data correctness, integrity,
and security, especially in systems that handle sensitive information like financial …
and security, especially in systems that handle sensitive information like financial …
Rage against the machine clear: A systematic analysis of machine clears and their implications for transient execution attacks
Since the discovery of the Spectre and Meltdown vulnerabilities, transient execution attacks
have increasingly gained momentum. However, while the community has investigated …
have increasingly gained momentum. However, while the community has investigated …
Adversarial prefetch: New cross-core cache side channel attacks
Modern x86 processors have many prefetch instructions that can be used by programmers
to boost performance. However, these instructions may also cause security problems. In …
to boost performance. However, these instructions may also cause security problems. In …
{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
Spy in the gpu-box: Covert and side channel attacks on multi-gpu systems
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …
accelerators, which make it possible to carry out computationally demanding training and …
Binoculars:{Contention-Based}{Side-Channel} attacks exploiting the page walker
Microarchitectural side channels are a pressing security threat. These channels are created
when programs modulate hardware resources in a secret data-dependent fashion. They are …
when programs modulate hardware resources in a secret data-dependent fashion. They are …
{Side-Channel} Attacks on Optane Persistent Memory
There is a constant evolution of technology for cloud environments, including the
development of new memory storage technology, such as persistent memory. The newly …
development of new memory storage technology, such as persistent memory. The newly …
Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning
Cache partitioning is a principled defense against side-channel attacks on shared last-level
caches (LLCs). Such defenses allocate isolated cache regions to distrusting applications …
caches (LLCs). Such defenses allocate isolated cache regions to distrusting applications …