Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PACMAN: attacking ARM pointer authentication with speculative execution
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
A Survey on Thwarting Memory Corruption in RISC-V
M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …
paramount to keep these systems secure. A threat plaguing these systems consists of …
A comprehensive survey of hardware-assisted security: From the edge to the cloud
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …
control. In the Internet of Things world, for example, the security of data could be posed at …
{SMASH}: Synchronized many-sided rowhammer attacks from {JavaScript}
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent
DDR4 modules are still vulnerable to many-sided Rowhammer bit flips. While these bit flips …
DDR4 modules are still vulnerable to many-sided Rowhammer bit flips. While these bit flips …
[PDF][PDF] Preventing Kernel Hacks with HAKCs.
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …
All kernel code shares a single address space, executes with elevated processor privileges …
Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication
Memory safety is a key security property that stops memory corruption vulnerabilities.
Different types of memory safety enforcement solutions have been proposed and adopted by …
Different types of memory safety enforcement solutions have been proposed and adopted by …
Strongbox: A gpu tee on arm endpoints
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …
computation such as image processing and numerical processing applications. However, in …
{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
xmp: Selective memory protection for kernel and user space
Attackers leverage memory corruption vulnerabilities to establish primitives for reading from
or writing to the address space of a vulnerable process. These primitives form the foundation …
or writing to the address space of a vulnerable process. These primitives form the foundation …
Authenticated call stack
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI).
Software shadow stacks trade off security for performance. Hardware-assisted shadow …
Software shadow stacks trade off security for performance. Hardware-assisted shadow …