CD Proc. of the Asia and South Pacific International Conference on Embedded SoCs (ASPICES05), Jul. 2005.This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-overflow attacks at run time. A number of malicious codes exploit buffer-overflow vulnerability to alter a return-address value and hijack the program-execution control. In order to solve the security issue, SCache generates replica cache lines on each return-address store, and compares the original value loaded from the memory stack with the replica one on the corresponding return-address load. The number and the placement policy of the replica line strongly affect both performance and vulnerability. In our evaluation, it has been observed that SCach...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
This paper presents a systematic solution to the per-sistent problem of buffer overflow attacks. Buf...
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, pote...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications w...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
This paper presents a systematic solution to the per-sistent problem of buffer overflow attacks. Buf...
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, pote...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications w...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
This paper presents a systematic solution to the per-sistent problem of buffer overflow attacks. Buf...
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, pote...