Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Bhattacharyya, Atri"'
Autor:
Bhattacharyya, Atri, Sandulescu, Alexandra, Neugschwandtner, Matthias, Sorniotti, Alessandro, Falsafi, Babak, Payer, Mathias, Kurmus, Anil
Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural weaknesses. However, it remains unclear as to what extent
Externí odkaz:
http://arxiv.org/abs/1903.01843
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Double-fetch bugs are a plague across all major operating system kernels. They occur when data is fetched twice across the user/kernel trust boundary while allowing concurrent modification. Such bugs enable an attacker to illegally access memory, cau
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______185::895edf44a30c47c2399cc7347d5c19e8
https://infoscience.epfl.ch/record/290014
https://infoscience.epfl.ch/record/290014
Autor:
Bhattacharyya, Atri, Ienne, Paolo
Dynamically-scheduled elastic circuits generated by High-Level Synthesis (HLS) tools are inherently out-of-order, following the flow of data rather than the evolution of an instruction pointer. Components of the circuit which access memory need to be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______185::60824c6c9f71ab80ee92feec76ef262e
https://infoscience.epfl.ch/record/261327
https://infoscience.epfl.ch/record/261327
Autor:
Bhattacharyya, Atri, Marin, Andres Sanchez, Koruyeh, Esmaeil Mohammmadian, Abu-Ghazaleh, Nael, Song, Chengyu, Payer, Mathias
Speculative execution attacks, such as Spectre, reuse code from the victim’s binary to access and leak secret information during speculative execution. Every variant of the attack requires very particular code sequences, necessitating elaborate gad
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______185::b9e8955aa45fe718e1c06f0cadcce74b
https://infoscience.epfl.ch/record/278929
https://infoscience.epfl.ch/record/278929
Autor:
Bhattacharyya, Atri, Hofhammer, Florian, Li, Yuanlong, Gupta, Siddharth, Sánchez Marín, Andrés, Falsafi, Babak, Payer, Mathias
Modern programs are monolithic, combining code of varied provenance without isolation, all the while running on network-connected devices. A vulnerability in any component may compromise code and data of all other components. Compartmentalization sep
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______185::71c822a211827012178aaf1de0160cce
https://infoscience.epfl.ch/record/301914
https://infoscience.epfl.ch/record/301914
Autor:
Pal I; Department of Neurobiology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261., Bhattacharyya A; Department of Otolaryngology, Washington University School of Medicine, St. Louis, MO 63110., V-Ghaffari B; Department of Otolaryngology, Washington University School of Medicine, St. Louis, MO 63110., Williams ED; Department of Neurobiology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261., Xiao M; Department of Otolaryngology, Washington University School of Medicine, St. Louis, MO 63110., Rutherford MA; Department of Otolaryngology, Washington University School of Medicine, St. Louis, MO 63110., Rubio ME; Department of Neurobiology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261.; Department of Otolaryngology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261.
Publikováno v:
BioRxiv : the preprint server for biology [bioRxiv] 2024 Apr 15. Date of Electronic Publication: 2024 Apr 15.