Rowhammer has drawn much attention from both academia and industry in th...
Speculative execution techniques have been a cornerstone of modern proce...
Rowhammer attacks that corrupt level-1 page tables to gain kernel privil...
Fuzzing is becoming more and more popular in the field of vulnerability
...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
Deep Neural Networks (DNNs) models become one of the most valuable enter...
In this paper, we study the problem of publishing a stream of real-value...
As recently emerged rowhammer exploits require undocumented DRAM address...
Existing speculative execution attacks are limited to breaching
confiden...
Rowhammer exploits frequently access specific DRAM rows (i.e., hammer ro...
Data collection under local differential privacy (LDP) has been mostly
s...
CPU cache is limited but crucial storage on modern processor whereas the...
In paravirtualization, the page table management components of the guest...
Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...
Rowhammer is a hardware-based bug that allows the attacker to modify the...
Intel has introduced a trusted computing technology, Intel Software Guar...
Commodity OS kernels have broad attack surfaces due to the large code ba...
Commodity OS kernels are known to have broad attack surfaces due to the ...
All the state-of-the-art rowhammer attacks can break the MMU-enforced
in...