Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors 2018
DOI: 10.1145/3267494.3267499
|View full text |Cite
|
Sign up to set email alerts
|

CPU Security Benchmark

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
9
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…By summarizing literatures of CPU vulnerabilities, the CPU vulnerabilities can be categorized into two types: (1) vulnerabilities that implemented in the CPU design architecture (Memory Sinkhole [7] in 2015, Meltdown [10], Spectre [11] and TLBleed [12] in 2018); (2) vulnerabilities that executed in the CPU instruction set (FDIV [5] in 1994, F00F [6] in 1997 and ''RosenBridge'' [8] in 2018). The former vulnerabilities are caused by logical defects in the CPU design architecture [1]. This type of vulnerabilities requires researchers to have a deep knowledge of CPU architecture and implementation, and it is difficult to automate and formalization [11].…”
Section: ) History Of Cpu Vulnerabilities and Backdoorsmentioning
confidence: 99%
See 4 more Smart Citations
“…By summarizing literatures of CPU vulnerabilities, the CPU vulnerabilities can be categorized into two types: (1) vulnerabilities that implemented in the CPU design architecture (Memory Sinkhole [7] in 2015, Meltdown [10], Spectre [11] and TLBleed [12] in 2018); (2) vulnerabilities that executed in the CPU instruction set (FDIV [5] in 1994, F00F [6] in 1997 and ''RosenBridge'' [8] in 2018). The former vulnerabilities are caused by logical defects in the CPU design architecture [1]. This type of vulnerabilities requires researchers to have a deep knowledge of CPU architecture and implementation, and it is difficult to automate and formalization [11].…”
Section: ) History Of Cpu Vulnerabilities and Backdoorsmentioning
confidence: 99%
“…The instruction set is an interface provided by the CPU to the software and operating system layers, which can be directly called and operated [4]. Therefore, many mature technologies in software security can be applied to CPU instruction set analysis [1]. And this paper also adopts the Undocumented Instruction Search to find suspicious instructions of potential CPU vulnerabilities.…”
Section: ) History Of Cpu Vulnerabilities and Backdoorsmentioning
confidence: 99%
See 3 more Smart Citations