An analysis of the Intel 80/spl times/86 security architecture and implementations
O Sibert, PA Porras, R Lindell - IEEE Transactions on Software …, 1996 - ieeexplore.ieee.org
… Essentially, we are performing an architecture study of the 80x86 protection mechanisms
and a penetration testing effort. Section 5 and Section 6 review related work and discuss our …
and a penetration testing effort. Section 5 and Section 6 review related work and discuss our …
The intel 80/spl times/86 processor architecture: pitfalls for secure systems
O Sibert, PA Porras, R Lindell - … IEEE Symposium on Security …, 1995 - ieeexplore.ieee.org
… architectural subtleties and reported implementation errors. … are performing an architecture
study of the 80x86 protection … security architecture, as well as numerous others that did not. …
study of the 80x86 protection … security architecture, as well as numerous others that did not. …
[BOOK][B] Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers
J Ledin, D Farley - 2022 - books.google.com
… instruction set computer architecture. A complete instruction set specification has been
released and a number of hardware implementations of this architecture are currently available. …
released and a number of hardware implementations of this architecture are currently available. …
A Security Review of the Cell Broadband Engine Processor
J Smith, X He, J Alves-Foss - 2010 43rd Hawaii International …, 2010 - ieeexplore.ieee.org
… first analysis on a more modern processor was seen in 1996 [15], investigating the Intel 80x86
… However, in this research we examined current implementations. The results of our work …
… However, in this research we examined current implementations. The results of our work …
Ghost in the machine
T Van Vleck - IEEE Security & Privacy, 2007 - computer.org
… A virtual 360 has relatively few instructions, compared to the 80x86. Olin Sibert and his
colleagues' paper, "An Analysis of the Intel 80x86 Security Architecture and Implementations" …
colleagues' paper, "An Analysis of the Intel 80x86 Security Architecture and Implementations" …
Yet another microarchitectural attack: exploiting I-cache
O Aciiçmez - … 2007 ACM workshop on Computer security architecture, 2007 - dl.acm.org
… The basics of RSA cryptosystem and the details of OpenSSL’s RSA implementation are …
cache analysis concept, in Section 6. Then we point out a protected RSA implementation …
cache analysis concept, in Section 6. Then we point out a protected RSA implementation …
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
JS Robin, CE Irvine - 9th USENIX Security Symposium (USENIX Security …, 2000 - usenix.org
… implementing secure VMMs on the Intel Pentium architecture. The requirements for various
types of VMMs are reviewed. We report an analysis … of the Intel x86 architecture family allows …
types of VMMs are reviewed. We report an analysis … of the Intel x86 architecture family allows …
On the power of simple branch prediction analysis
… the most successful one, the Intel x86-architecture, cf. [34]. … implementations as a case study
to describe the basics of their novel attacks an adversary can use to compromise the security …
to describe the basics of their novel attacks an adversary can use to compromise the security …
[PDF][PDF] Analysis of Intel IA-64 processor support for a secure virtual machine monitor
K Karadeniz - 2001 - core.ac.uk
… Several architectures such as the VAX security kernel, the Intel x86, the Disco and the
Alpha are … the software requirements for the host operating system for implementing a VMM. …
Alpha are … the software requirements for the host operating system for implementing a VMM. …
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
P Royal, M Halpin, D Dagon… - … Computer Security …, 2006 - ieeexplore.ieee.org
… We also provide details of the implementation and evaluation … , we begin by performing
static analysis over it to acquire a … practice, a running example of an Intel 80x86-based unpack-…
static analysis over it to acquire a … practice, a running example of an Intel 80x86-based unpack-…