当前位置: X-MOL 学术IEEE Secur. Priv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
IEEE Security & Privacy ( IF 2.9 ) Pub Date : 2020-09-01 , DOI: 10.1109/msec.2020.2993896
Michael Schwarz 1 , Daniel Gruss 1
Affiliation  

Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).

中文翻译:

可信执行环境如何推动对微架构攻击的研究

可信执行环境 (TEE) 支持在特权最高的攻击者精确控制系统和微架构的场景中进行研究。从此类攻击中获得的洞察有助于发现非 TEE 攻击,例如 Spectre(以及来自虚拟机内的 Foreshadow)。
更新日期:2020-09-01
down
wechat
bug