Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …
arbitrary program data under malicious speculation, and later exfiltrating that data over …
TAG: Tagged architecture guide
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …
researchers and attackers. Hardware solutions based on tagging are emerging as a …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
Architecture support for disciplined approximate programming
Disciplined approximate programming lets programmers declare which parts of a program
can be computed approximately and consequently at a lower energy cost. The compiler …
can be computed approximately and consequently at a lower energy cost. The compiler …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
Register transfer level information flow tracking for provably secure hardware design
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …
about security properties related to integrity, confidentiality, and logical side channel …
HDFI: Hardware-assisted data-flow isolation
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …
defense mechanisms are inadequate; in general, the software-based approaches are not …
[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …
(IoT). However, their wide deployment raises the incentive for attackers to target these …
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for
example, when handling important cryptographic keys or sensitive financial data. We …
example, when handling important cryptographic keys or sensitive financial data. We …