Corpus ID: 54438746

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

@article{Dessouky2018WhenAP,
  title={When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs},
  author={G. Dessouky and D. Gens and P. Haney and Garrett Persyn and A. Kanuparthi and Hareesh Khattri and Jason M. Fung and A. Sadeghi and J. Rajendran},
  journal={ArXiv},
  year={2018},
  volume={abs/1812.00197}
}
Modern computer systems are becoming faster, more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex, with continuously new features introducing the possibility of new bugs. Hence, the semiconductor industry employs a combination of different verification techniques to ensure the security of System-on-Chip (SoC) designs during the development life cycle. However, a growing number of increasingly sophisticated attacks are… Expand
2 Citations
Analyzing Hardware Security Properties of Processors through Model Checking
Hardware Penetration Testing Knocks Your SoCs Off
  • 1

References

SHOWING 1-10 OF 99 REFERENCES
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
  • 101
  • PDF
Reflections on the Pentium Division Bug
  • 26
  • PDF
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
  • 303
  • PDF
Formal Security Verification of Concurrent Firmware in SoCs using Instruction-Level Abstraction for Hardware*
  • 5
  • PDF
Formal Approaches to Hardware Trust Verification
  • 2
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
  • 227
  • PDF
Practical Timing Side Channel Attacks against Kernel Space ASLR
  • 271
  • PDF
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
  • 477
  • Highly Influential
  • PDF
Control-flow integrity
  • 780
  • PDF
...
1
2
3
4
5
...