Archive of posts tagged: Security
Offensive Security Research in Computer Architecture Conferences
We rarely see attack papers published in architecture conferences. What is the benefit of publishing attacks? What makes an attack paper instructive and valuable?
Freedom vs. Security in Computer Systems
Is it time to consider designing and operating computer systems with an “off-by-default” attitude to proactively defend against such attacks?
HARDWARE 0-DAYS: PUBLISH, SELL OR HOARD? (PART IV)
What should vendors do when they discover that a hardware 0-day has been used to exploit systems built on their product? Some vulnerabilities may permit vendors to patch the vulnerability using microcode updates. For instance, a mitigation for the row hammer DRAM...
