2018
DOI: 10.48550/arxiv.1805.08506
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(16 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…10: Speculative control-flow bending attack example. [9], [32] IRBS, IBPB, STIBP [6], [34] (SLH) [19], (YSNB) [51] Retpoline [65] RSB Stuffing [33] CSF [63] ConTExT [59] SPECCFI Spectre-PHT Spectre-BTB Spectre-RSB SmotherSpectre…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…10: Speculative control-flow bending attack example. [9], [32] IRBS, IBPB, STIBP [6], [34] (SLH) [19], (YSNB) [51] Retpoline [65] RSB Stuffing [33] CSF [63] ConTExT [59] SPECCFI Spectre-PHT Spectre-BTB Spectre-RSB SmotherSpectre…”
Section: Related Workmentioning
confidence: 99%
“…LFENCE [6], [9], [32] IRBS, IBPB, STIBP [6], [34] (SLH) [19], (YSNB) [51] Retpoline [65] RSB Stuffing [33] CSF [63] ConTExT [59] SPECCFI [57], [58], [66], [69] since they rely on speculation within a single instruction and therefore do not rely on manipulating the branch prediction structures.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations