Spectre Returns! Speculation Attacks using the Return Stack Buffer.
Esmaeil Mohammadian KoruyehKhaled N. KhasawnehChengyu SongNael B. Abu-GhazalehPublished in: CoRR (2018)
Keyphrases
- buffer overflow
- countermeasures
- buffer size
- cyber attacks
- malicious attacks
- traffic analysis
- sharpe ratio
- watermarking scheme
- dow jones
- security protocols
- web services
- malicious users
- security threats
- buffer allocation
- digital image watermarking
- replacement policy
- digital watermarking
- computer security
- privacy preserving