专题:Security and Verification in Computing

This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.
最新文献
Spectre Returns! Speculation Attacks Using the Return Stack Buffer

preprint Full Text OpenAlex

KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities

article Full Text OpenAlex

OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF

book-chapter Full Text OpenAlex

MSCH: Microbatch-Based Selective Activation Checkpointing With Recomputation Hidden for Efficient Training of LLM Models

article Full Text OpenAlex

Confidential Computing Proofs

article Full Text OpenAlex

Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation

article Full Text OpenAlex

WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation

article Full Text OpenAlex

Towards a Sound Construction of EVM Bytecode Control-Flow Graphs

article Full Text OpenAlex

Verification of Correctness and Security Properties for CRYSTALS-KYBER

article Full Text OpenAlex

Evaluation of time-based virtual machine migration as moving target defense against host-based attacks

article Full Text OpenAlex

近5年高被引文献
QUIC: A UDP-Based Multiplexed and Secure Transport

report Full Text OpenAlex 698 FWCI0

Semi-invasive attacks – A new approach to hardware security analysis

article Full Text OpenAlex 345 FWCI0

IEEE Transactions on Dependable and Secure Computing

paratext Full Text OpenAlex 307 FWCI0

Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions

article Full Text OpenAlex 297 FWCI41.65841587

2021 IEEE Symposium on Security and Privacy (SP)

paratext Full Text OpenAlex 286 FWCI0

DeepWukong

article Full Text OpenAlex 258 FWCI53.85907507

Zero Trust Architecture (ZTA): A Comprehensive Survey

article Full Text OpenAlex 226 FWCI48.41863433

A Survey of Smart Contract Formal Specification and Verification

review Full Text OpenAlex 200 FWCI46.58082169

Optimal Good-Case Latency for Rotating Leader Synchronous BFT

preprint Full Text OpenAlex 180 FWCI28.11934218

PLATYPUS: Software-based Power Side-Channel Attacks on x86

article Full Text OpenAlex 178 FWCI19.47229337