Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Timing side-channel attacks and countermeasures in CPU microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …
microarchitecture state to steal the user's secret data and even compromise the operating …
Survey of transient execution attacks and their mitigations
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …
interest in the last few years as they can cause critical data leakage. Since the first …
PACMAN: attacking ARM pointer authentication with speculative execution
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
Smotherspectre: exploiting speculative execution through port contention
Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted
execution environments, and browsers are prone to information disclosure through micro …
execution environments, and browsers are prone to information disclosure through micro …
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …
arbitrary program data under malicious speculation, and later exfiltrating that data over …
NDA: Preventing speculative execution attacks at their source
Speculative execution attacks like Meltdown and Spectre work by accessing secret data in
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …
Cleanupspec: An" undo" approach to safe speculation
Speculation-based attacks affect hundreds of millions of computers. These attacks typically
exploit caches to leak information, using speculative instructions to cause changes to the …
exploit caches to leak information, using speculative instructions to cause changes to the …
Efficient invisible speculative execution through selective delay and value prediction
Speculative execution, the base on which modern high-performance general-purpose CPUs
are built on, has recently been shown to enable a slew of security attacks. All these attacks …
are built on, has recently been shown to enable a slew of security attacks. All these attacks …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
Speculative interference attacks: Breaking invisible speculation schemes
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …
significant challenge for processor design. These highly publicized vulnerabilities use …