System call filtering is a widely used security mechanism for protecting...
Cache template attacks demonstrated automated leakage of user input in s...
Growing code bases of modern applications have led to a steady increase ...
In this paper, we analyze the security of programming languages and thei...
Modern applications often consist of different security domains that req...
Memory utilization can be reduced by merging identical memory blocks int...
Compression algorithms are widely used as they save memory without losin...
In the quest for efficiency and performance, edge-computing providers
el...
Software vulnerabilities in applications undermine the security of
appli...
Since 2016, multiple microarchitectural attacks have exploited an effect...
Recently, out-of-order execution, an important performance optimization ...
Out-of-order execution and speculative execution are among the biggest
c...
In early 2018, Meltdown first showed how to read arbitrary kernel memory...
Meltdown and Spectre exploit microarchitectural changes the CPU makes du...
Modern CPU architectures offer strong isolation guarantees towards user
...
We present a new hardware-agnostic side-channel attack that targets one ...
Modern processor optimizations such as branch prediction and out-of-orde...
In this paper, we present NetSpectre, a generic remote Spectre variant 1...
A fundamental assumption in software security is that memory contents do...
The security of computer systems fundamentally relies on memory isolatio...
Modern processors use branch prediction and speculative execution to max...
Double-fetch bugs are a special type of race condition, where an unprivi...