•C/C++/assembly are not memory-safe: •No bounds checking on array accesses •No validity checks on pointer arithmetic or dereferencing •Process-based address space isolation does not isolate code from itself!: •Malicious inputs can trigger inappropriate memory accesses •Attackers can use those accesses to: •Steal sensitive data from a process or the kernel •Subvert the process’s control flow •Escalate privilege - Notifications
You must be signed in to change notification settings - Fork 0
TheLeopardsH/Software_based_side_channel_attacks
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
Software based Side Channel attacks
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published