On-demand cut off the covert channel to mitigate meltdown  

在线阅读下载全文

作  者:Yusong TAN Baozi CHEN Liehuang ZHU Qingbo WU Peng ZOU Yuanzhang LI 

机构地区:[1]College of Computer Science,National University of Defense Technology,Changsha 410073,China [2]School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China

出  处:《Science China(Information Sciences)》2021年第9期240-242,共3页中国科学(信息科学)(英文版)

基  金:This work was supported by National S&T Major Project of China(Grant No.2016ZX01040101);National Natural Science Foundation of China(Grant Nos.61602498,61872444)。

摘  要:Dear editor,Recently, researchers have discovered a new kind of attack named Meltdown [1] that exploits the out-of-order execution behavior of modern processors and side-channels. The adversary can use this method to overcome the memory isolation that is protected by a processor and read the entire kernel memory of a machine it executes on. Mitigating this new attack is thought to be expensive at the moment because current solutions are based on common optimization techniques for modern processors.

关 键 词:OVERCOME KERNEL protected 

分 类 号:TN918[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象