Speculator: a tool to analyze speculative execution attacks and mitigations
暂无分享,去创建一个
Engin Kirda | Alessandro Sorniotti | Andrea Mambretti | William Robertson | Anil Kurmus | Matthias Neugschwandtner
[1] S. Eranian. Perfmon2: a flexible performance monitoring interface for Linux , 2010 .
[2] Craig Disselkoen,et al. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX , 2017, USENIX Security Symposium.
[3] Christian Rossow,et al. ret2spec: Speculative Execution Using Return Stack Buffers , 2018, CCS.
[4] Arnaldo Carvalho de Melo,et al. The New Linux ’ perf ’ Tools , 2010 .
[5] Christof Fetzer,et al. You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass , 2018, ArXiv.
[6] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.
[7] Klaus Wagner,et al. Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.
[8] Somayeh Sardashti,et al. The gem5 simulator , 2011, CARN.
[9] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[10] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[11] Gerhard Wellein,et al. LIKWID Monitoring Stack: A Flexible Framework Enabling Job Specific Performance monitoring for the masses , 2017, 2017 IEEE International Conference on Cluster Computing (CLUSTER).
[12] Herbert Bos,et al. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks , 2018, USENIX Security Symposium.
[13] David W. Wall,et al. Limits of instruction-level parallelism , 1991, ASPLOS IV.
[14] Martin Schwarzl,et al. NetSpectre: Read Arbitrary Memory over Network , 2018, ESORICS.
[15] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[16] Nael B. Abu-Ghazaleh,et al. Spectre Returns! Speculation Attacks Using the Return Stack Buffer , 2018, IEEE Design & Test.
[17] Carl A. Waldspurger,et al. Speculative Buffer Overflows: Attacks and Defenses , 2018, ArXiv.
[18] Alessandro Sorniotti,et al. Two methods for exploiting speculative control flow hijacks , 2019, WOOT @ USENIX Security Symposium.
[19] Guang R. Gao,et al. Speculative execution and branch prediction on parallel machines , 1993, ICS '93.
[20] Venkatesh Akella,et al. Position Paper: A case for exposing extra-architectural state in the ISA , 2018 .
[21] Butler W. Lampson. Lazy and speculative execution in computer systems , 2008, ICFP 2008.
[22] Nael B. Abu-Ghazaleh,et al. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation , 2018, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[23] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[24] Jack J. Dongarra,et al. Collecting Performance Data with PAPI-C , 2009, Parallel Tools Workshop.
[25] Matthias Hauswirth,et al. Accuracy of performance counter measurements , 2009, 2009 IEEE International Symposium on Performance Analysis of Systems and Software.