SpecVerilog: Adapting Information Flow Control for Secure Speculation
Abstract
References
Index Terms
- SpecVerilog: Adapting Information Flow Control for Secure Speculation
Recommendations
Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank
GLSVLSI '17: Proceedings of the Great Lakes Symposium on VLSI 2017Embedded systems are prone to security attacks from their limited resources available for self-protection and unsafe language typically used for application programming. Attacks targeting control flow is one of the most common exploitations for embedded ...
CacheRewinder: revoking speculative cache updates exploiting write-back buffer
DATE '22: Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in EuropeTransient execution attacks are critical security threats since those attacks exploit speculative execution which is an essential architectural solution that can improve the performance of out-of-order processors significantly. Such attacks change cache ...
Secure Speculation via Speculative Secret Flow Tracking
AbstractSpeculative execution attacks can leak arbitrary program data under malicious speculation, presenting a severe security threat. Based on two key observations, this paper presents a software-transparent defense mechanism called speculative secret ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/dc8a5ccc-463e-4ede-91d8-150f253e2510/3576915.cover.jpg)
- General Chairs:
- Weizhi Meng,
- Christian D. Jensen,
- Program Chairs:
- Cas Cremers,
- Engin Kirda
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- DARPA
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 176Total Downloads
- Downloads (Last 12 months)176
- Downloads (Last 6 weeks)14
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in