Essays about: "spectre attack"
Showing result 1 - 5 of 7 essays containing the words spectre attack.
-
1. Exposing memory accesses and branches in machine code to symbolic execution : Tracking instructions through binary raising
University essay from Linköpings universitet/Programvara och systemAbstract : In 2018, a new security vulnerability was discovered that existed in billions of processors from different manufacturers, using various architectures. A so-called spectre attack can be launched to exploit the vulnerability and cause cryptographic information to leak through side-channels of the targeted system. READ MORE
-
2. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE
-
3. Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Transient-execution attacks have been deemed a large threat for microarchitectures through research in recent years. In this work, I reproduce and develop transient-execution attacks against RISC-V and CHERI-RISC-V microarchitectures. READ MORE
-
4. Speculative Interference: A Modern Spectre Attack
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Since the Spectre family of attacks were made public knowledge in January of 2018, researchers, manufacturers and interested individuals have experimented a lot with creating defences against it. But there have also been a lot of research aimed at circumventing these defences and finding alternative side-channels and mechanisms for performing Spectre-type attacks. READ MORE
-
5. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE