Essays about: "Meltdown"

Showing result 1 - 5 of 21 essays containing the word Meltdown.

  1. 1. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Franz Anton Fuchs; [2021]
    Keywords : ;

    Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE

  2. 2. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE

  3. 3. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Gunnar Grimsdal; Patrik Lundgren; [2019]
    Keywords : Genode; Meltdown; Spectre; Nova; Okl4; microarchitectural attacks; microkernel;

    Abstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE

  4. 4. Design Space Exploration for Value Prediction in Security Applications

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Linnea Gunnarsson; [2019]
    Keywords : Spectre; Meltdown; Value prediction;

    Abstract : With the introduction of Spectre and Meltdown, two new attacks thattarget the speculative instructions due to Out-of-Order execution intoday's processors, a new way to handle speculative loads has beenproposed. Instead of performing the speculative load, the approach isto predict them. This is a new way to use value predictors. READ MORE

  5. 5. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE