Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular source of exploitation. Existing …
Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution vulnerabilities, as it allows an attacker …
Translation Lookaside Buffers, or TLBs, play a vital role in recent microarchitectural attacks. However, unlike CPU caches, we know …
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized reads in the architectural or …
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on mispredicted conditional branches (Spectre-PHT), …
To improve code coverage and flip complex program branches, hybrid fuzzers couple fuzzing with concolic execution. Despite its …