Hardware Based Monitoring For Zero Trust Environments


A technical paper titled "Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments" was published by the Air Force Institute of Technology. Abstract "The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine ... » read more

Heterogenous Computing & Cache Attacks


Researchers at imec-COSIC, KU Leuven presented this paper titled "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies" at the USENIX Security Symposium in Boston in August 2022. Note, this is a prepublication paper. Abstract: "As the performance of general-purpose processors faces diminishing improvements, computing systems are increasingly equipped with domai... » read more

RETBLEED: New Spectre-BTI Attack (ETH Zurich)


New Spectre-BTI attack that "leaks arbitrary kernel memory." It's detailed in this research paper titled “RETBLEED: Arbitrary Speculative Code Execution with Return Instructions” from researchers at ETH Zürich. Mitigations are available. Abstract "Modern operating systems rely on software defenses against hardware attacks. These defenses are, however, as good as the assumptions they m... » read more