Essays about: "meltdown"
Showing result 1 - 5 of 21 essays containing the word meltdown.
-
1. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE
-
2. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE
-
3. Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. READ MORE
-
4. Design Space Exploration for Value Prediction in Security Applications
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : With the introduction of Spectre and Meltdown, two new attacks thattarget the speculative instructions due to Out-of-Order execution intoday's processors, a new way to handle speculative loads has beenproposed. Instead of performing the speculative load, the approach isto predict them. This is a new way to use value predictors. READ MORE
-
5. Physical Proximity Verification based on Physical Unclonable Functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE