This is the artifact of our paper "Pensieve: Microarchitectural Modeling for Security Evaluation". Our artifact is the implementation of the Pensieve framework (Figure 5) for the security evaluation of microarchitecture defenses against speculative execution attacks. The artifact includes μarch models for a variety of defense mechanisms encoded in a solver-based programming language (i.e., Rosette), and scripts for performing bounded model checking on these uarch models for counterexample detection. This artifact release can be used to reproduce the two attack examples as shown in Figure 7 and Figure 9(a), as well as the performance evaluation results for the checking time as shown in the plots in Figure 10
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Designing secure and reliable systems is a difficult task. Threat modeling is a process that support...
This repository contains the benchmarks and results obtained for the work "Large Language Models Can...
This is the artifact of our paper "Pensieve: A Modular Approach for Security Evaluation of Microarch...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Our artifact is comprised of a cache model, a cache-occupancy attack implementation, and a Maximal L...
This artifact contains the Coq mechanization accompanying the paper "Proving full-system security pr...
Many program analysis tools and techniques have been developed to assess program vulnerability. Yet,...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
see also https://zenodo.org/record/7958412International audienceThis paper introduces µArchiFI, an o...
Artifacts attached to the article "A Security Model for Randomization-based Protected Caches", by Jo...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Designing secure and reliable systems is a difficult task. Threat modeling is a process that support...
This repository contains the benchmarks and results obtained for the work "Large Language Models Can...
This is the artifact of our paper "Pensieve: A Modular Approach for Security Evaluation of Microarch...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Our artifact is comprised of a cache model, a cache-occupancy attack implementation, and a Maximal L...
This artifact contains the Coq mechanization accompanying the paper "Proving full-system security pr...
Many program analysis tools and techniques have been developed to assess program vulnerability. Yet,...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
see also https://zenodo.org/record/7958412International audienceThis paper introduces µArchiFI, an o...
Artifacts attached to the article "A Security Model for Randomization-based Protected Caches", by Jo...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Designing secure and reliable systems is a difficult task. Threat modeling is a process that support...
This repository contains the benchmarks and results obtained for the work "Large Language Models Can...