Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on automated dynamic malware-analysis techniques and tools
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …
Receiving thousands of new samples every day is not uncommon. The signatures that …
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …
arbitrary program data under malicious speculation, and later exfiltrating that data over …
libdft: Practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …
propagate during program execution. DFT has been repeatedly implemented by a variety of …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
Register transfer level information flow tracking for provably secure hardware design
A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …
about security properties related to integrity, confidentiality, and logical side channel …
Complete information flow tracking from the gates up
M Tiwari, HMG Wassel, B Mazloom, S Mysore… - Proceedings of the 14th …, 2009 - dl.acm.org
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for
example, when handling important cryptographic keys or sensitive financial data. We …
example, when handling important cryptographic keys or sensitive financial data. We …
HDFI: Hardware-assisted data-flow isolation
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …
defense mechanisms are inadequate; in general, the software-based approaches are not …
[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …
(IoT). However, their wide deployment raises the incentive for attackers to target these …
Context: A generic approach for mitigating spectre
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …
performance and efficiency of modern processors. However, they are inconsiderate, leaking …