Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
ZombieLoad: Cross-privilege-boundary data sampling
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space
by exploiting side-effects from transient instructions. While this attack has been mitigated …
by exploiting side-effects from transient instructions. While this attack has been mitigated …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
PLATYPUS: Software-based power side-channel attacks on x86
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
Netspectre: Read arbitrary memory over network
All Spectre attacks so far required local code execution. We present the first fully remote
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+ …
A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
Retrofitting fine grain isolation in the Firefox renderer
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …
Medusa: Microarchitectural data leakage via automated attack synthesis
In May 2019, a new class of transient execution attack based on Meltdown called
microarchitectural data sampling (MDS), was disclosed. MDS enables adversaries to leak …
microarchitectural data sampling (MDS), was disclosed. MDS enables adversaries to leak …
KASLR: Break it, fix it, repeat
In this paper, we analyze the hardware-based Meltdown mitigations in recent Intel
microarchitectures, revealing that illegally accessed data is only zeroed out. Hence, while …
microarchitectures, revealing that illegally accessed data is only zeroed out. Hence, while …
Precise and scalable detection of double-fetch bugs in OS kernels
During system call execution, it is common for operating system kernels to read userspace
memory multiple times (multi-reads). A critical bug may exist if the fetched userspace …
memory multiple times (multi-reads). A critical bug may exist if the fetched userspace …
Warpattack: bypassing cfi through compiler-introduced double-fetches
Code-reuse attacks are dangerous threats that attracted the attention of the security
community for years. These attacks aim at corrupting important control-flow transfers for …
community for years. These attacks aim at corrupting important control-flow transfers for …