Processor Vulnerability Discovery

被引:0
|
作者
Lyu, Yongqiang [1 ]
Sun, Rihui [2 ]
Qu, Gang [3 ]
机构
[1] Tsinghua Univ, Natl Res Ctr Informat Sci & Technol, Beijing, Peoples R China
[2] Harbin Inst Technol, Dept Comp Sci & Technol, Harbin, Peoples R China
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD USA
关键词
processor vulnerability; fuzzing testing; formal checking; ATTACK;
D O I
10.1109/DAC56929.2023.10247906
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Processor security vulnerability discovery has drawn increasing attention since the disclosure of Meltdown, Spectre and other vulnerabilities. This paper presents a concise roadmap of this emerging research direction from the simple manual discovery to automated discovery methodologies, as well as the major challenges along the roadmap.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
    Fulton, Kelsey R.
    Katcher, Samantha
    Song, Kevin
    Chetty, Marshini
    Mazurek, Michelle L.
    Messdaghi, Chloe
    Votipka, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1997 - 2014
  • [2] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [3] Modeling the vulnerability discovery process
    Alhazmi, O. H.
    Malaiya, Y. K.
    16TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2005, : 129 - 138
  • [4] Modeling Skewness in Vulnerability Discovery
    Joh, HyunChul
    Malaiya, Yashwant K.
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2014, 30 (08) : 1445 - 1459
  • [5] Featherweight assisted vulnerability discovery
    Binkley, David
    Moonen, Leon
    Isaacman, Sibren
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 146
  • [6] A Survey on IoT Vulnerability Discovery
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 267 - 282
  • [7] Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
    Rahimi, Sanaz
    Zargham, Mehdi
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (02) : 395 - 407
  • [8] Security Vulnerability in Processor-Interconnect Router Design
    Song, WonJun
    Kim, John
    Lee, Jae W.
    Abts, Dennis
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 358 - 368
  • [9] Architectural Vulnerability Aware Checkpoint Placement in a Multicore Processor
    Lotfi, Atieh
    Bayat, Arash
    Safari, Saeed
    2012 IEEE 18TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2012, : 118 - 120
  • [10] A Parallel Discord Discovery Algorithm for a Graphics Processor
    Ya. A. Kraeva
    M. L. Zymbler
    Pattern Recognition and Image Analysis, 2023, 33 : 101 - 112