Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Branch history injection: On the effectiveness of hardware mitigations against {Cross-Privilege} spectre-v2 attacks
Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution
vulnerabilities, as it allows an attacker to abuse indirect branch mispredictions to leak …
vulnerabilities, as it allows an attacker to abuse indirect branch mispredictions to leak …
Swivel: Hardening {WebAssembly} against spectre
We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm)
against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in …
against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in …
SoK: Practical foundations for software Spectre defenses
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …
allowing attackers to steal sensitive data despite previously state-of-the-art …
Ultimate {SLH}: Taking speculative load hardening to the next level
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures.
Specifically, we systematically investigate the performance penalty and security properties of …
Specifically, we systematically investigate the performance penalty and security properties of …
{BunnyHop}: Exploiting the instruction prefetcher
BunnyHop: Exploiting the Instruction Prefetcher Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA …
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA …
The gates of time: Improving cache attacks with transient execution
D Katzman, W Kosasih, C Chuengsatiansup… - 32nd USENIX Security …, 2023 - usenix.org
For over two decades, cache attacks have been shown to pose a significant risk to the
security of computer systems. In particular, a large number of works show that cache attacks …
security of computer systems. In particular, a large number of works show that cache attacks …
Indirector:{High-Precision} Branch Target Injection Attacks Exploiting the Indirect Branch Predictor
This paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging
the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer …
the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer …
Inception: Exposing new attack surfaces with training in transient execution
To protect against transient control-flow hijacks, software relies on a secure state of
microarchitectural buffers that are involved in branching decisions. To achieve this secure …
microarchitectural buffers that are involved in branching decisions. To achieve this secure …
Half&half: Demystifying intel's directional branch predictors for fast, secure partitioned execution
This paper presents Half&Half, a novel software defense against branch-based side-
channel attacks. Half&Half isolates the effects of different protection domains on the …
channel attacks. Half&Half isolates the effects of different protection domains on the …
Automatic detection of speculative execution combinations
Modern processors employ different speculation mechanisms to speculate over different
kinds of instructions. Attackers can exploit these mechanisms simultaneously in order to …
kinds of instructions. Attackers can exploit these mechanisms simultaneously in order to …