Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract
暂无分享,去创建一个
M. Frans Kaashoek | Nickolai Zeldovich | Adam Belay | Jonathan Behrens | Anton Cao | Cel Skeggs | N. Zeldovich | J. Behrens | M. Kaashoek | A. Belay | Anton Cao | Cel Skeggs
[1] Li Zhou,et al. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels , 2019, 2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT).
[2] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[3] Xiao Zhang,et al. CPI2: CPU performance isolation for shared compute clusters , 2013, EuroSys '13.
[4] Josep Torrellas,et al. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data , 2019, IEEE Micro.
[5] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[6] Nael B. Abu-Ghazaleh,et al. SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[7] Abhishek Verma,et al. Large-scale cluster management at Google with Borg , 2015, EuroSys.
[8] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[9] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[10] Daniel Gruss,et al. ZombieLoad: Cross-Privilege-Boundary Data Sampling , 2019, CCS.
[11] Frank Piessens,et al. A Systematic Evaluation of Transient Execution Attacks and Defenses , 2018, USENIX Security Symposium.
[12] Daniel Genkin,et al. SGAxe: How SGX Fails in Practice , 2020 .
[13] Herbert Bos,et al. RIDL: Rogue In-Flight Data Load , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[14] Austin T. Clements,et al. The scalable commutativity rule: designing scalable software for multicore processors , 2013, SOSP.
[15] Ofir Weisse,et al. NDA: Preventing Speculative Execution Attacks at Their Source , 2019, MICRO.
[16] Krste Asanovic,et al. Mondrix: memory isolation for linux using mondriaan memory protection , 2005, SOSP '05.
[17] M. Frans Kaashoek,et al. RadixVM: scalable address spaces for multithreaded applications , 2013, EuroSys '13.
[18] Kaveh Razavi,et al. CrossTalk: Speculative Data Leaks Across Cores Are Real , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[19] Stefan Mangard,et al. KASLR is Dead: Long Live KASLR , 2017, ESSoS.
[20] Frank Piessens,et al. Fallout: Leaking Data on Meltdown-resistant CPUs , 2019, CCS.
[21] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.
[22] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[23] Jon Masters,et al. On the Spectre and Meltdown Processor Security Vulnerabilities , 2019, IEEE Micro.
[24] Michael Stumm,et al. An analysis of performance evolution of Linux's core operations , 2019, SOSP.
[25] Robert Schilling,et al. ConTExT: Leakage-Free Transient Execution , 2019, ArXiv.