Position Paper: A case for exposing extra-architectural state in the ISA
暂无分享,去创建一个
[1] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[2] Nael B. Abu-Ghazaleh,et al. Jump over ASLR: Attacking branch predictors to bypass ASLR , 2016, 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[3] Francesco Zappa Nardelli,et al. x86-TSO , 2010, Commun. ACM.
[4] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[5] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[6] Margaret Martonosi,et al. TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA , 2016, ASPLOS.
[7] Sarita V. Adve,et al. Shared Memory Consistency Models: A Tutorial , 1996, Computer.
[8] James R. Larus,et al. Singularity: rethinking the software stack , 2007, OPSR.
[9] Margaret Martonosi,et al. MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols , 2018, ArXiv.
[10] Onur Aciiçmez,et al. Yet another MicroArchitectural Attack:: exploiting I-Cache , 2007, CSAW '07.
[11] M. Hill,et al. Weak ordering-a new definition , 1990, [1990] Proceedings. The 17th Annual International Symposium on Computer Architecture.
[12] Anant Agarwal,et al. Factored operating systems (fos): the case for a scalable operating system for multicores , 2009, OPSR.
[13] Simha Sethumadhavan,et al. Side-channel vulnerability factor: A metric for measuring information leakage , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[14] Jonathan M. Smith,et al. SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs , 2015, ASPLOS.
[15] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[16] Ying Gao,et al. SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip , 2013, ISCA.
[17] Somayeh Sardashti,et al. The gem5 simulator , 2011, CARN.
[18] Dan Page,et al. Defending against cache-based side-channel attacks , 2003, Inf. Secur. Tech. Rep..
[19] Margaret Martonosi,et al. CCICheck: Using μhb graphs to verify the coherence-consistency interface , 2015, 2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[20] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[21] Stefan Mangard,et al. KASLR is Dead: Long Live KASLR , 2017, ESSoS.
[22] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[23] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] David Grawrock,et al. Dynamics of a trusted platform: a building block approach , 2009 .