Load-to-store: exploit the time leakage of store buffer transient window
To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to l...
Saved in:
Main Authors: | Ming TANG, Yifan HU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023051/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
by: ALEKSANDAR JEVREMOVIC, et al.
Published: (2025-01-01) -
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
by: Deqing ZOU, et al.
Published: (2022-04-01) -
Improved fast leakage assessment based on online counting
by: Zhengguang SHI, et al.
Published: (2021-04-01) -
VLSI implementation of AES algorithm against differential power attack and differential fault attack
by: HAN Jun, et al.
Published: (2010-01-01) -
Data-Oriented Analysis of Uplink Transmission in Massive IoT System With Limited Channel Information
by: Jyri Hamalainen, et al.
Published: (2024-01-01)