과제정보
본 연구는 정보통신기획평가원의 지원(No.2022-0-01200, No.2021-0-00724, No.2020-0-01840)과 한국연구재단의 지원(RS-2023-00240697)을 받아 수행된 연구임.
참고문헌
- YAN, Mengjia, et al. Invisispec: Making speculative execution invisible in the cache hierarchy. In: 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2018. p. 428-441.
- KHASAWNEH, Khaled N., et al. Safespec: Banishing the spectre of a meltdown with leakage-free speculation. In: 2019 56th ACM/IEEE Design Automation Conference (DAC). IEEE, 2019. p. 1-6.
- SCHWARZ, Michael, et al. Context: A generic approach for mitigating spectre. In: Network and Distributed System Security Symposium 2020. 2020.
- HERTOGH, Mathe, et al. Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. 2023. p. 207-221.
- PALIT, Tapti, et al. Dynpta: Combining static and dynamic analysis for practical selective data protection. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021. p. 1919-1937.
- QI, Zhenxiao, et al. SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. In: NDSS. 2021.
- JOHANNESMEYER, Brian, et al. Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. In: NDSS. 2022. p. 12.
- OLEKSENKO, Oleksii, et al. {SpecFuzz}: Bringing spectre-type vulnerabilities to the surface. In: 29th USENIX Security Symposium (USENIX Security 20). 2020. p. 1481-1498.