Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microarchitectural attack
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms