Spectre Returns! Speculation Attacks using the Return Stack Buffer.
Esmaeil Mohammadian KoruyehKhaled N. KhasawnehChengyu SongNael B. Abu-GhazalehPublished in: WOOT @ USENIX Security Symposium (2018)
Keyphrases
- buffer overflow
- countermeasures
- data corruption
- watermarking scheme
- malicious attacks
- digital image watermarking
- malicious users
- attack detection
- buffer size
- virtual memory
- security risks
- security threats
- sharpe ratio
- traffic analysis
- database
- cyber attacks
- security mechanisms
- watermarking algorithm
- information security
- steady state
- multistage
- signal processing
- web services
- neural network