Controlled-channel attacks: Deterministic side channels for untrusted operating systems
Y Xu, W Cui, M Peinado - 2015 IEEE Symposium on Security …, 2015 - ieeexplore.ieee.org
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …
operating systems has inspired a long line of work on excluding these operating systems …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …
Practical timing side channel attacks against kernel space ASLR
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to
protect both user space and kernel space code have been developed in the past years. A …
protect both user space and kernel space code have been developed in the past years. A …
Jump over ASLR: Attacking branch predictors to bypass ASLR
D Evtyushkin, D Ponomarev… - 2016 49th Annual …, 2016 - ieeexplore.ieee.org
Address Space Layout Randomization (ASLR) is a widely-used technique that protects
systems against a range of attacks. ASLR works by randomizing the offset of key program …
systems against a range of attacks. ASLR works by randomizing the offset of key program …
Hacking blind
We show that it is possible to write remote stack buffer overflow exploits without possessing
a copy of the target binary or source code, against services that restart after a crash. This …
a copy of the target binary or source code, against services that restart after a crash. This …
[PDF][PDF] ASLR on the Line: Practical Cache Attacks on the MMU.
Address space layout randomization (ASLR) is an important first line of defense against
memory corruption attacks and a building block for many modern countermeasures. Existing …
memory corruption attacks and a building block for many modern countermeasures. Existing …
SoK: Automated software diversity
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …
currently deployed defenses and the transition to online software distribution (the" App store" …
Side channel attacks for architecture extraction of neural networks
H Chabanne, JL Danger, L Guiga… - CAAI Transactions on …, 2021 - Wiley Online Library
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving
secret information from NNs. We differentiate multiple types of threat scenarios regarding …
secret information from NNs. We differentiate multiple types of threat scenarios regarding …