Analysis of Cyber Attack on Processor Architecture Through Exploiting Vulnerabilities

LK Hema, RK Dwibedi, S Regilan… - … AI Applications for …, 2024 - igi-global.com
A computer exploit exploits a system vulnerability to attack processor architectures including
ARM, AMD, and Intel. The main CPU architectures nowadays are 32-bit (x86) and 64-bit …

Impact of meltdown and spectre on cpu manufacture security issues

R Dastres, M Soori - International Journal of Engineering and Future …, 2020 - hal.science
The Meltdown and spectre holes are two security deficiencies which can provide access to
personal data for hackers and can potentially affect performances of Linux, Mac systems …

A review on vulnerabilities to modern processors and its mitigation for various variants

EP Kumar, S Priyanka, T Sudhakar - Procedia Computer Science, 2022 - Elsevier
Recently, security researchers have found two hardware security vulnerabilities namely
Spectre and Meltdown, related to computer memory. They are not singular, many variants of …

Security vulnerabilities in microprocessors

BA Smith, K Curran - Semiconductor Science and …, 2021 - journals.bilpubgroup.com
Microprocessors such as those found in PCs and smartphones are complex in their design
and nature. In recent years, an increasing number of security vulnerabilities have been …

On the spectre and meltdown processor security vulnerabilities

MD Hill, J Masters, P Ranganathan, P Turner… - IEEE Micro, 2019 - ieeexplore.ieee.org
This paper first reviews the Spectre and Meltdown processor security vulnerabilities that
were revealed during January–October 2018 and that allow the extraction of protected …

Modeling Microarchitectural Side Channel Attacks for Fun & Profit

J Ravichandran - 2021 - ideals.illinois.edu
The discovery of hardware vulnerabilities has increasingly become more frequent in recent
years. In the wake of the Spectre and Meltdown attacks, architectural security research has …

An Evaluation of Meltdown Vulnerability

M Nosek, K Szczypiorski - Proceedings of the 2022 9th International …, 2022 - dl.acm.org
These days processors are becoming faster and faster. This translates indirectly into a
significant improvement in the quality of life. However, there is a price to be paid; this …

The performance cost of software-based security mitigations

L Bowen, C Lupo - Proceedings of the ACM/SPEC international …, 2020 - dl.acm.org
Historically, performance has been the most important feature when optimizing computer
hardware. Modern processors are so highly optimized that every cycle of computation time …

Hardware vulnerability and mitigation survey

K Dharsee, E Johnson, J Criswell - 2017 - urresearch.rochester.edu
This report is a qualitative study of security-critical processor bugs observed in AMD
processors. Processor technology updates expand hardware feature sets which, similar to …

CPU security benchmark

J Zhu, W Song, Z Zhu, J Ying, B Li, B Tu, G Shi… - Proceedings of the 1st …, 2018 - dl.acm.org
The current electronic-economy is booming, electronic-wallets, encrypted virtual-money,
mobile payments, and other new generations of economic instruments are springing up. As …