Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PACMAN: attacking ARM pointer authentication with speculative execution
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …
{InSpectre} Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2
Spectre v2 is one of the most severe transient execution vulnerabilities, as it allows an
unprivileged attacker to lure a privileged (eg, kernel) victim into speculatively jum** to a …
unprivileged attacker to lure a privileged (eg, kernel) victim into speculatively jum** to a …
Transient-execution attacks: A computer architect perspective
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
level. These optimizations are meant to be invisible to the programmer but they are implicitly …
Rega: Scalable rowhammer mitigation with refresh-generating activations
Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM
rows before bits start to flip. These refreshes are scarce and can only happen periodically …
rows before bits start to flip. These refreshes are scarce and can only happen periodically …
I see dead µops: Leaking secrets via intel/amd micro-op caches
Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …
Going beyond the limits of sfi: Flexible and secure hardware-assisted in-process isolation with hfi
We introduce Hardware-assisted Fault Isolation (HFI), a simple extension to existing
processors to support secure, flexible, and efficient in-process isolation. HFI addresses the …
processors to support secure, flexible, and efficient in-process isolation. HFI addresses the …
SoK: Practical foundations for software Spectre defenses
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …
allowing attackers to steal sensitive data despite previously state-of-the-art …
Ultimate {SLH}: Taking speculative load hardening to the next level
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures.
Specifically, we systematically investigate the performance penalty and security properties of …
Specifically, we systematically investigate the performance penalty and security properties of …
[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …
AfterImage: Leaking control flow data and tracking load operations via the hardware prefetcher
Research into processor-based side-channels has seen both a large number and a large
variety of disclosed vulnerabilities that can leak critical, private data to malicious attackers …
variety of disclosed vulnerabilities that can leak critical, private data to malicious attackers …