Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Survey of microarchitectural side and covert channels, attacks, and defenses
J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …
exfiltrating information for a computer system. Processor microarchitectural timing-based …
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …
arbitrary program data under malicious speculation, and later exfiltrating that data over …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
A hardware design language for timing-sensitive information-flow security
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …
recently prominent example is cache probing attacks, which rely on timing channels created …
Data oblivious ISA extensions for side channel-resistant and high performance computing
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in
hardware security today. Recently, there has been a surge of effort that attempts to block …
hardware security today. Recently, there has been a surge of effort that attempts to block …
Opening pandora's box: A systematic study of new ways microarchitecture can leak private data
Microarchitectural attacks have plunged Computer Architecture into a security crisis. Yet, as
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …
Sapper: A language for hardware-level security policy enforcement
Privacy and integrity are important security concerns. These concerns are addressed by
controlling information flow, ie, restricting how information can flow through a system. Most …
controlling information flow, ie, restricting how information can flow through a system. Most …
SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip
As multicore processors find increasing adoption in domains such as aerospace and
medical devices where failures have the potential to be catastrophic, strong performance …
medical devices where failures have the potential to be catastrophic, strong performance …