Skip to main content

Showing 1–2 of 2 results for author: Sandulescu, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2003.05503  [pdf, other

    cs.CR

    Bypassing memory safety mechanisms through speculative control flow hijacks

    Authors: Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus

    Abstract: The prevalence of memory corruption bugs in the past decades resulted in numerous defenses, such as stack canaries, control flow integrity (CFI), and memory safe languages. These defenses can prevent entire classes of vulnerabilities, and help increase the security posture of a program. In this paper, we show that memory corruption defenses can be bypassed using speculative execution attacks. We s… ▽ More

    Submitted 19 April, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

    Comments: To appear at IEEE EuroS&P 2021 (https://www.ieee-security.org/TC/EuroSP2021/)

  2. SMoTherSpectre: exploiting speculative execution through port contention

    Authors: Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus

    Abstract: Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural weaknesses. However, it remains unclear as to what extent other applications, in particular those that do not load attacker-provided code, may be impacted. It also remains unclear as to what extent these att… ▽ More

    Submitted 26 September, 2019; v1 submitted 5 March, 2019; originally announced March 2019.