Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microarchitecture
biblio
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
pubcrawl
transient execution attacks
Transient analysis
testing
synthesize
security
Scalability
Resiliency
resilience
attack chains
Program processors
privacy
microarchitecture
Heuristic algorithms
framework
dynamically
Chained Attacks
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
Metrics
Zero-day attacks
Zero day attacks
side-channel attacks
Resiliency
resilience
pubcrawl
Monitoring
microarchitecture
composability
machine learning
Identification
Hardware
feature extraction
Detectors
detection
defense
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Program processors
Transient analysis
speculative-execution
Spectre
side-channel attacks
Scalability
return oriented programming
Resiliency
Registers
pubcrawl
rop attacks
microarchitecture-security
microarchitecture
microarchitectural-attack
Human Factors
Human behavior
Hardware
composability
arrays
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
biblio
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic
Submitted by aekwall on Wed, 02/13/2019 - 12:01pm
Scalability
controlled-channel
Enclave
meltdown
microarchitecture
SGX
Resiliency
Human behavior
Attack vectors
pubcrawl
« first
‹ previous
1
2