Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
This repository was archived by the owner on Jun 11, 2024. It is now read-only.

Tool to Analyze Speculative Execution Attacks and Mitigations

License

NotificationsYou must be signed in to change notification settings

ibm-research/speculator

Repository files navigation

Speculator

Tool to Analyze Speculative Execution Attacks and Mitigations

QuickStart

A quickstart guide can be foundhere.In the guide, you can find information and commands on how to build and use speculator.

For more examples please refer tohere

For more infomation please refer to thewiki.

Branches

develop: contains the lastest version of Speculator (which might be not fully functional)

master: it is the stable branch where the releases will be published

others: the other branches represent currently developed features

Publications

  • [1] A. Mambretti, A. Sandulescu, M. Neugschwandtner, A. Sorniotti, A. Kurmus
    Two Methods for Exploiting Speculative Control Flow Hijacks.
    13th USENIX Workshop on Offensive Technologies (WOOT), Santa Clara, CA, USA, August 2019

  • [2] A. Mambretti, M. Neugschwandtner, A. Sorniotti, E. Kirda, W. Robertson, A. Kurmus
    Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations
    35th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 2019

  • [3] A. Mambretti, P. Convertini, A. Sorniotti, A. Sandulescu, E. Kirda, A. Kurmus
    GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers
    28th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, Hawaii, March 2021

  • [4] A. Mambretti, A. Sandulescu, A. Sorniotti, W. Robertson, E. Kirda, A. Kurmus
    Bypassing memory safety mechanisms through speculative control flow hijacking
    6th IEEE European Symposium on Security and Privacy (EuroSP), Vienna, Austria, September 2021

Git flow

This repository follows thegit-flow branching model. Make sure to read andfollow that model.AVH git extension makes things much easier to handle,therefore everyone is invited to check them out.

About

Tool to Analyze Speculative Execution Attacks and Mitigations

Resources

License

Stars

Watchers

Forks

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp