Uisfuzz: An efficient fuzzing method for cpu undocumented instruction searching

X Li, Z Wu, Q Wei, H Wu - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of network security and the frequent appearance of CPU
vulnerabilities, CPU security have gradually raised great attention and become a crucial …

An optimal seed scheduling strategy algorithm applied to cyberspace mimic defense

Z Chen, Y Lu, J Qin, Z Cheng - IEEE Access, 2021 - ieeexplore.ieee.org
Cyberspace mimic defense (CMD) is an active defense theory that has emerged in recent
years. By dynamically constructing and scheduling multiple executors, the CMD can not only …

Neural network stealing via meltdown

H Jeong, D Ryu, J Hur - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Deep learning services are now deployed in various fields on top of cloud infrastructures. In
such cloud environment, virtualization technology provides logically independent and …

Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining

X Zhang, Z Chen, J Ye, H Li, J Wang, C Liu, B Li - Applied Sciences, 2023 - mdpi.com
As recently studied, the undocumented instructions in embedded processors that may cause
catastrophic results for devices have become one of the main threats to system security. To …

A high efficiency and accuracy method for x86 undocumented instruction detection and classification

J Wu, B Cui, C Chen, X Long - Innovative Mobile and Internet Services in …, 2022 - Springer
Processors are important parts of a computer and have been believed to be secure for a
long time. In recent years researches show that processors are, on the contrary, full of …

A Comprehensive and Cross-Platform Test Suite for Memory Safety--Towards an Open Framework for Testing Processor Hardware Supported Security Extensions

W Song, J Ying, S Shen, B Li, H Ma, P Liu - arXiv preprint arXiv …, 2021 - arxiv.org
Memory safety remains a critical and widely violated property in reality. Numerous defense
techniques have been proposed and developed but most of them are not applied or enabled …

[PDF][PDF] A performance evaluation of platform-independent methods to search for hidden instructions on risc processors

R Dofferhoff - Leiden Univ., Leiden, The Netherlands, 2019 - theses.liacs.nl
Undocumented and faulty instructions can pose a security risk, as shown in the past with the
infamous f00f-bug. A scanner that searches for undocumented instructions can be a useful …

Timing Function Attack: Bypassing Advanced Code Reuse Defenses and Enhancing Spectre Attack

M Cai, D Zhang, H Huang - papers.ssrn.com
Recently, many effective defensive methods (eg, ASLR, execute-no-read) have been
proposed to defeat the code reuse attack in the software system. These approaches provide …

Research on CPU instruction security

H Wu, Q Wei, Z Wu - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Based on the research of abnormal instruction, Meltdown, Spectre, undocumented
instruction and so on in the processor architecture, this paper considers that instruction …

An efficient mining method for DSP undocumented instruction

X Zhang, J Wang, C Liu, B Li - International Conference on …, 2023 - spiedigitallibrary.org
Nowadays, DSP processors have been widely used in wireless network systems, since it
can meet high-speed real-time information processing requirements. Meanwhile, the …