Essays about: "spectre attack"

Showing result 1 - 5 of 7 essays containing the words spectre attack.

  1. 1. Exposing memory accesses and branches in machine code to symbolic execution : Tracking instructions through binary raising

    University essay from Linköpings universitet/Programvara och system

    Author : Isak Axelsson; [2023]
    Keywords : Binary lifting; Binary raising; Spectre;

    Abstract : In 2018, a new security vulnerability was discovered that existed in billions of processors from different manufacturers, using various architectures. A so-called spectre attack can be launched to exploit the vulnerability and cause cryptographic information to leak through side-channels of the targeted system. READ MORE

  2. 2. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Xiaoyue Chen; [2022]
    Keywords : ;

    Abstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE

  3. 3. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Franz Anton Fuchs; [2021]
    Keywords : ;

    Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE

  4. 4. Speculative Interference: A Modern Spectre Attack

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Isak Borg; [2021]
    Keywords : Spectre; spectre attack; speculative interference; speculative execution; invisible speculation; gem5;

    Abstract : Since the Spectre family of attacks were made public knowledge in January of 2018, researchers, manufacturers and interested individuals have experimented a lot with creating defences against it. But there have also been a lot of research aimed at circumventing these defences and finding alternative side-channels and mechanisms for performing Spectre-type attacks. READ MORE

  5. 5. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE