Uisfuzz: An efficient fuzzing method for cpu undocumented instruction searching
X Li, Z Wu, Q Wei, H Wu - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of network security and the frequent appearance of CPU
vulnerabilities, CPU security have gradually raised great attention and become a crucial …
vulnerabilities, CPU security have gradually raised great attention and become a crucial …
An optimal seed scheduling strategy algorithm applied to cyberspace mimic defense
Z Chen, Y Lu, J Qin, Z Cheng - IEEE Access, 2021 - ieeexplore.ieee.org
Cyberspace mimic defense (CMD) is an active defense theory that has emerged in recent
years. By dynamically constructing and scheduling multiple executors, the CMD can not only …
years. By dynamically constructing and scheduling multiple executors, the CMD can not only …
Neural network stealing via meltdown
Deep learning services are now deployed in various fields on top of cloud infrastructures. In
such cloud environment, virtualization technology provides logically independent and …
such cloud environment, virtualization technology provides logically independent and …
Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
X Zhang, Z Chen, J Ye, H Li, J Wang, C Liu, B Li - Applied Sciences, 2023 - mdpi.com
As recently studied, the undocumented instructions in embedded processors that may cause
catastrophic results for devices have become one of the main threats to system security. To …
catastrophic results for devices have become one of the main threats to system security. To …
A high efficiency and accuracy method for x86 undocumented instruction detection and classification
J Wu, B Cui, C Chen, X Long - Innovative Mobile and Internet Services in …, 2022 - Springer
Processors are important parts of a computer and have been believed to be secure for a
long time. In recent years researches show that processors are, on the contrary, full of …
long time. In recent years researches show that processors are, on the contrary, full of …
A Comprehensive and Cross-Platform Test Suite for Memory Safety--Towards an Open Framework for Testing Processor Hardware Supported Security Extensions
Memory safety remains a critical and widely violated property in reality. Numerous defense
techniques have been proposed and developed but most of them are not applied or enabled …
techniques have been proposed and developed but most of them are not applied or enabled …
[PDF][PDF] A performance evaluation of platform-independent methods to search for hidden instructions on risc processors
R Dofferhoff - Leiden Univ., Leiden, The Netherlands, 2019 - theses.liacs.nl
Undocumented and faulty instructions can pose a security risk, as shown in the past with the
infamous f00f-bug. A scanner that searches for undocumented instructions can be a useful …
infamous f00f-bug. A scanner that searches for undocumented instructions can be a useful …
Timing Function Attack: Bypassing Advanced Code Reuse Defenses and Enhancing Spectre Attack
Recently, many effective defensive methods (eg, ASLR, execute-no-read) have been
proposed to defeat the code reuse attack in the software system. These approaches provide …
proposed to defeat the code reuse attack in the software system. These approaches provide …
Research on CPU instruction security
H Wu, Q Wei, Z Wu - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Based on the research of abnormal instruction, Meltdown, Spectre, undocumented
instruction and so on in the processor architecture, this paper considers that instruction …
instruction and so on in the processor architecture, this paper considers that instruction …
An efficient mining method for DSP undocumented instruction
X Zhang, J Wang, C Liu, B Li - International Conference on …, 2023 - spiedigitallibrary.org
Nowadays, DSP processors have been widely used in wireless network systems, since it
can meet high-speed real-time information processing requirements. Meanwhile, the …
can meet high-speed real-time information processing requirements. Meanwhile, the …