Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
RIDL: Rogue in-flight data load
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
Hodor:{Intra-Process} isolation for {High-Throughput} data plane libraries
As network, I/O, accelerator, and NVM devices capable of a million operations per second
make their way into data centers, the software stack managing such devices has been …
make their way into data centers, the software stack managing such devices has been …
xmp: Selective memory protection for kernel and user space
Attackers leverage memory corruption vulnerabilities to establish primitives for reading from
or writing to the address space of a vulnerable process. These primitives form the foundation …
or writing to the address space of a vulnerable process. These primitives form the foundation …
{KSplit}: Automating device driver isolation
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …
isolation to protect kernels from defects and vulnerabilities in device drivers. With …
Skybridge: Fast and secure inter-process communication for microkernels
Microkernels have been extensively studied over decades. However, IPC (Inter-Process
Communication) is still a major factor of runtime overhead, where fine-grained isolation …
Communication) is still a major factor of runtime overhead, where fine-grained isolation …
Lightweight kernel isolation with virtualization and VM functions
Commodity operating systems execute core kernel subsystems in a single address space
along with hundreds of dynamically loaded extensions and device drivers. Lack of isolation …
along with hundreds of dynamically loaded extensions and device drivers. Lack of isolation …
Containerguard: A real-time attack detection system in container-based big data platform
As a lightweight, flexible, and high-performance operating system virtualization, containers
are used to speed up the big data platform. However, due to the imperfection of the resource …
are used to speed up the big data platform. However, due to the imperfection of the resource …
Severity: Code injection attacks against encrypted virtual machines
Modern enterprises increasingly take advantage of cloud infrastructures. Yet, outsourcing
code and data into the cloud requires enterprises to trust cloud providers not to meddle with …
code and data into the cloud requires enterprises to trust cloud providers not to meddle with …
Evolution of defenses against transient-execution attacks
Transient-execution attacks, such as Meltdown and Spectre, exploit performance
optimizations in modern CPUs to enable unauthorized access to data across protection …
optimizations in modern CPUs to enable unauthorized access to data across protection …
(Mostly) exitless {VM} protection from untrusted hypervisor through disaggregated nested virtualization
Today's cloud tenants are facing severe security threats such as compromised hypervisors,
which forces a strong adversary model where the hypervisor should be excluded out of the …
which forces a strong adversary model where the hypervisor should be excluded out of the …