A Survey on Thwarting Memory Corruption in RISC-V
M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …
paramount to keep these systems secure. A threat plaguing these systems consists of …
Cryptographic hashing in p4 data planes
P4 introduces a standardized, universal way for data plane programming. Secure and
resilient communication typically involves the processing of payload data and specialized …
resilient communication typically involves the processing of payload data and specialized …
Flexible traffic splitting in OpenFlow networks
D Tuncer, M Charalambides… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Traffic engineering (TE) functionality aims to control and fine-tune the routing configuration
and bandwidth allocation in order to optimize the use of network resources and avoid the …
and bandwidth allocation in order to optimize the use of network resources and avoid the …
A control flow integrity checking technique based on hardware support
Y Li, Z Dai, J Li - 2018 IEEE 3rd Advanced Information …, 2018 - ieeexplore.ieee.org
In this paper, we propose a new hardware-supported lightweight control flow integrity check
method in RISC architecture processors, which resists code reuse attacks with negligible …
method in RISC architecture processors, which resists code reuse attacks with negligible …
RAGuard: A hardware based mechanism for backward-edge control-flow integrity
Control-flow integrity (CFI) is considered as a general and promising method to prevent
code-reuse attacks, which utilize benign code sequences to realize arbitrary computation …
code-reuse attacks, which utilize benign code sequences to realize arbitrary computation …
STBPU: A reasonably secure branch prediction unit
T Zhang, T Lesch, K Koltermann… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
Modern processors have suffered a deluge of threats exploiting branch instruction collisions
inside the branch prediction unit (BPU), from eavesdropping on secret-related branch …
inside the branch prediction unit (BPU), from eavesdropping on secret-related branch …
DHash: Dynamic Hash Tables With Non-Blocking Regular Operations
J Wang, D Liu, X Fu, F Xiao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Once started, existing hash tables cannot change their pre-defined hash functions, even if
the incoming data cannot be evenly distributed to the hash table buckets. In this paper, we …
the incoming data cannot be evenly distributed to the hash table buckets. In this paper, we …
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks
Conflict-based cache side-channel attacks against the last-level cache (LLC) is a widely
exploited method for information leaking. Cache randomization has recently been accepted …
exploited method for information leaking. Cache randomization has recently been accepted …
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping
With the growth in number and significance of the emerging applications that require
extremely low latencies, network operators are facing increasing need to perform latency …
extremely low latencies, network operators are facing increasing need to perform latency …
Hardware acceleration of hash operations in modern microprocessors
AA Fairouz, M Abusultan, VV Fedorov… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern microprocessors contain several special function units (SFUs) such as specialized
arithmetic units, cryptographic processors, etc. In recent times, applications such as cloud …
arithmetic units, cryptographic processors, etc. In recent times, applications such as cloud …