Platforms are nowadays typically equipped with tristed execution environ...
We construct novel thread-modular analyses that track relational informa...
To put static program analysis at the fingertips of the software develop...
Growing code bases of modern applications have led to a steady increase ...
Modern applications often consist of different security domains that req...
Compression algorithms are widely used as they save memory without losin...
In the quest for efficiency and performance, edge-computing providers
el...
We give thread-modular non-relational value analyses as abstractions of ...
In the last years, a series of side channels have been discovered on CPU...
Software vulnerabilities in applications undermine the security of
appli...
Since 2016, multiple microarchitectural attacks have exploited an effect...
Contact tracing apps running on mobile devices promise to reduce the man...
Recently, out-of-order execution, an important performance optimization ...
Out-of-order execution and speculative execution are among the biggest
c...
In early 2018, Meltdown first showed how to read arbitrary kernel memory...
Meltdown and Spectre exploit microarchitectural changes the CPU makes du...
Modern CPU architectures offer strong isolation guarantees towards user
...
We present a new hardware-agnostic side-channel attack that targets one ...
Modern processor optimizations such as branch prediction and out-of-orde...
In this paper, we present NetSpectre, a generic remote Spectre variant 1...
A fundamental assumption in software security is that memory contents do...
The security of computer systems fundamentally relies on memory isolatio...
Modern processors use branch prediction and speculative execution to max...
Double-fetch bugs are a special type of race condition, where an unprivi...