bayarearest.blogg.se

Xonotic cachce
Xonotic cachce












xonotic cachce

Hacking in darkness: Return-oriented programming against secure enclaves.

  • Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent ByungHoon Kang.
  • In Proceedings of the 27th USENIX Security Symposium (Security), Baltomore, MD, August 2018.

    xonotic cachce

    Meltdown: Reading kernel memory from user space. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg.In Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2019. Spectre attacks: Exploiting speculative execution. Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom.Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F.

    XONOTIC CACHCE SOFTWARE

    In Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX'17, 2017. Sgx-step: A practical attack framework for precise enclave execution control.

  • Jo Van Bulck, Frank Piessens, and Raoul Strackx.
  • xonotic cachce

    In 11th USENIX Workshop on Offensive Technologies (WOOT 17), Vancouver, BC, August 2017. Software grand exposure: SGX cache attacks are practical. Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi.In Proceedings of the 26th USENIX Security Symposium (Security), Vancouver, Canada, August 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution.

    xonotic cachce

    Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, and Raoul Strackx.In 2015 IEEE Symposium on Security and Privacy, San Jose, CA, May 2015. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, RI, April 2019. Heterogeneous isolated execution for commodity gpus. Insu Jang, Adrian Tang, Taehoon Kim, Simha Sethumadhavan, and Jaehyuk Huh.In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Carlsbad, CA, October 2018. Graviton: Trusted execution environments on gpus. Stavros Volos, Kapil Vaswani, and Rodrigo Bruno.In Proceedings of the 2020 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2020. Protection: Root-of-trust for io in compromised platforms. Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, and Srdjan Capkun.Fidelius: Protecting user secrets from compromised browsers. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 2017. Sgxio: Generic trusted i/o path for intel sgx. Innovative technology for cpu based attestation and sealing. Ittai Anati, Shay Gueron, Simon P Johnson, and Vincent R Scarlata.In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, pages 10:1-10:1, New York, NY, USA, 2013. Innovative instructions and software model for isolated execution. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V.Deep dive into networking for unity's fps sample game. Unveiling the underground world of anti-cheats. Battleye: The anti-cheat gold standard.Report: Cheating is becoming a big problem in online gaming.














    Xonotic cachce