Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Zhuojia Shen"'
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
SecDev
Remote code disclosure attacks threaten embedded systems as they allow attackers to steal intellectual property or to find reusable code for use in control-flow hijacking attacks. Execute-only memory (XOM) prevents remote code disclosures, but existi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0f510774f01a23e295b1e48e0ce89839
Publikováno v:
CCS
Speculative execution is one of the key techniques that modern processors use to boost performance. However, recent research shows that speculative execution can be used to steal sensitive data. We present a software-based solution to mitigate Spectr
Publikováno v:
HASP@ISCA
Side-channel attacks, such as Spectre and Meltdown, that leverage speculative execution pose a serious threat to computing systems. Worse yet, such attacks can be perpetrated by compromised operating system (OS) kernels to bypass defenses that protec
Publikováno v:
Zhuojia Shen
Microcontroller-based embedded systems are increasingly used for applications that can have serious and immediate consequences if compromised---including automobile control systems, smart locks, drones, and implantable medical devices. Due to resourc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb4d19cd167b972ef45a254cce169f15
https://www.usenix.org/conference/usenixsecurity20/presentation/zhou-jie
https://www.usenix.org/conference/usenixsecurity20/presentation/zhou-jie
Publikováno v:
Zhuojia Shen
Side-channel attacks such as Spectre that utilize speculative execution to steal application secrets pose a significant threat to modern computing systems. While program transformations can mitigate some Spectre attacks, more advanced attacks can div
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91a57e8cdaaecee077e4fe5a2530dd56
http://arxiv.org/abs/1903.10651
http://arxiv.org/abs/1903.10651
Publikováno v:
Zhuojia Shen
Task mapping in modern high performance parallel computers can be modeled as a graph embedding problem, which simulates the mapping as embedding one graph into another and try to find the minimum wirelength for the mapping. Though embedding problems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::009fdd08c065f0852e1fe106cbdbc746
http://arxiv.org/abs/1511.07932
http://arxiv.org/abs/1511.07932