A Survey on Thwarting Memory Corruption in RISC-V

M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …

Cryptographic hashing in p4 data planes

D Scholz, A Oeldemann, F Geyer… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
P4 introduces a standardized, universal way for data plane programming. Secure and
resilient communication typically involves the processing of payload data and specialized …

Flexible traffic splitting in OpenFlow networks

D Tuncer, M Charalambides… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Traffic engineering (TE) functionality aims to control and fine-tune the routing configuration
and bandwidth allocation in order to optimize the use of network resources and avoid the …

A control flow integrity checking technique based on hardware support

Y Li, Z Dai, J Li - 2018 IEEE 3rd Advanced Information …, 2018 - ieeexplore.ieee.org
In this paper, we propose a new hardware-supported lightweight control flow integrity check
method in RISC architecture processors, which resists code reuse attacks with negligible …

RAGuard: A hardware based mechanism for backward-edge control-flow integrity

J Zhang, R Hou, J Fan, K Liu, L Zhang… - Proceedings of the …, 2017 - dl.acm.org
Control-flow integrity (CFI) is considered as a general and promising method to prevent
code-reuse attacks, which utilize benign code sequences to realize arbitrary computation …

STBPU: A reasonably secure branch prediction unit

T Zhang, T Lesch, K Koltermann… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
Modern processors have suffered a deluge of threats exploiting branch instruction collisions
inside the branch prediction unit (BPU), from eavesdropping on secret-related branch …

DHash: Dynamic Hash Tables With Non-Blocking Regular Operations

J Wang, D Liu, X Fu, F Xiao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Once started, existing hash tables cannot change their pre-defined hash functions, even if
the incoming data cannot be evenly distributed to the hash table buckets. In this paper, we …

Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks

W Song, Z Xue, J Han, Z Li, P Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Conflict-based cache side-channel attacks against the last-level cache (LLC) is a widely
exploited method for information leaking. Cache randomization has recently been accepted …

Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping

M Shahzad, AX Liu - ACM SIGMETRICS Performance Evaluation …, 2014 - dl.acm.org
With the growth in number and significance of the emerging applications that require
extremely low latencies, network operators are facing increasing need to perform latency …

Hardware acceleration of hash operations in modern microprocessors

AA Fairouz, M Abusultan, VV Fedorov… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern microprocessors contain several special function units (SFUs) such as specialized
arithmetic units, cryptographic processors, etc. In recent times, applications such as cloud …