Material de USENIX Security 2016

Otra de las conferencias referentes sobre seguridad, USENIX Security 2016, ha publicado el material presentado: Flip Feng Shui: Hammering a Needle in the Software Stack - PDF One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation - PDF - Slides PIkit: A New Kernel-Independent Processor-Interconnect Rootkit - PDF - Slides Verifying Constant-Time Implementations - PDF Secure, Precise, and Fast Floating-Point Operations on x86 Processors - PDF - Slides überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor - PDF Undermining Information Hiding (and What to Do about It) - PDF Poking Holes in Information Hiding - PDF What Cannot Be Read, Cannot Be Leveraged?
Leer más