An analysis of the Intel 80/spl times/86 security architecture and implementations

O Sibert, PA Porras, R Lindell - IEEE Transactions on Software …, 1996 - ieeexplore.ieee.org
… Essentially, we are performing an architecture study of the 80x86 protection mechanisms
and a penetration testing effort. Section 5 and Section 6 review related work and discuss our …

The intel 80/spl times/86 processor architecture: pitfalls for secure systems

O Sibert, PA Porras, R Lindell - … IEEE Symposium on Security …, 1995 - ieeexplore.ieee.org
architectural subtleties and reported implementation errors. … are performing an architecture
study of the 80x86 protection … security architecture, as well as numerous others that did not. …

[BOOK][B] Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers

J Ledin, D Farley - 2022 - books.google.com
… instruction set computer architecture. A complete instruction set specification has been
released and a number of hardware implementations of this architecture are currently available. …

A Security Review of the Cell Broadband Engine Processor

J Smith, X He, J Alves-Foss - 2010 43rd Hawaii International …, 2010 - ieeexplore.ieee.org
… first analysis on a more modern processor was seen in 1996 [15], investigating the Intel 80x86
… However, in this research we examined current implementations. The results of our work …

Ghost in the machine

T Van Vleck - IEEE Security & Privacy, 2007 - computer.org
… A virtual 360 has relatively few instructions, compared to the 80x86. Olin Sibert and his
colleagues' paper, "An Analysis of the Intel 80x86 Security Architecture and Implementations" …

Yet another microarchitectural attack: exploiting I-cache

O Aciiçmez - … 2007 ACM workshop on Computer security architecture, 2007 - dl.acm.org
… The basics of RSA cryptosystem and the details of OpenSSL’s RSA implementation are …
cache analysis concept, in Section 6. Then we point out a protected RSA implementation

Analysis of the Intel Pentium's ability to support a secure virtual machine monitor

JS Robin, CE Irvine - 9th USENIX Security Symposium (USENIX Security …, 2000 - usenix.org
implementing secure VMMs on the Intel Pentium architecture. The requirements for various
types of VMMs are reviewed. We report an analysis … of the Intel x86 architecture family allows …

On the power of simple branch prediction analysis

O Aciiçmez, ÇK Koç, JP Seifert - … , computer and communications security, 2007 - dl.acm.org
… the most successful one, the Intel x86-architecture, cf. [34]. … implementations as a case study
to describe the basics of their novel attacks an adversary can use to compromise the security

[PDF][PDF] Analysis of Intel IA-64 processor support for a secure virtual machine monitor

K Karadeniz - 2001 - core.ac.uk
… Several architectures such as the VAX security kernel, the Intel x86, the Disco and the
Alpha are … the software requirements for the host operating system for implementing a VMM. …

Polyunpack: Automating the hidden-code extraction of unpack-executing malware

P Royal, M Halpin, D Dagon… - … Computer Security …, 2006 - ieeexplore.ieee.org
… We also provide details of the implementation and evaluation … , we begin by performing
static analysis over it to acquire a … practice, a running example of an Intel 80x86-based unpack-…