•C/C++/assembly are not memory-safe:
•No bounds checking on array accesses
•No validity checks on pointer arithmetic or dereferencing
•Process-based address space isolation does not isolate code from itself!:
•Malicious inputs can trigger inappropriate memory accesses
•Attackers can use those accesses to:
•Steal sensitive data from a process or the kernel
•Subvert the process’s control flow
•Escalate privilege
-
Notifications
You must be signed in to change notification settings - Fork 0
TheLeopardsH/Software_based_side_channel_attacks
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Software based Side Channel attacks
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published