LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks
Abstract
References
Index Terms
- LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks
Recommendations
SPECRUN: The Danger of Speculative Runahead Execution in Processors
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceRunahead execution is a continuously evolving microarchitectural technique for processor performance. This paper introduces the first transient execution attack on the runahead execution, called SPECRUN, which exploits the unresolved branch prediction ...
Performance evolution of mitigating transient execution attacks
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer SystemsToday's applications pay a performance penalty for mitigations to protect against transient execution attacks such as Meltdown [32] and Spectre [25]. Such a reduction in performance directly translates to higher operating costs and degraded user ...
CacheGuard: a security-enhanced directory architecture against continuous attacks
CF '19: Proceedings of the 16th ACM International Conference on Computing FrontiersModern processor cores share the last-level cache and directory to improve resource utilization. Unfortunately, such sharing makes the cache vulnerable to cross-core cache side channel attacks. Recent studies show that information leakage through cross-...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigmicro
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 157Total Downloads
- Downloads (Last 12 months)157
- Downloads (Last 6 weeks)32
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in