首页 > 最新文献

Computers & Security最新文献

英文 中文
Folded-tag: Enhancing memory safety with efficient hardware-supported memory tagging 折叠标签:通过有效的硬件支持的内存标签增强内存安全性
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2025-12-31 DOI: 10.1016/j.cose.2025.104822
Sumin Yang, Hongjoo Jin, Wonsuk Choi, Dong Hoon Lee
Memory corruption vulnerabilities, such as out-of-bound memory access, are widely exploited by attackers to compromise system security. Numerous software-based techniques have been developed to prevent such vulnerabilities, but they often require a trade-off between security and performance. In response, Memory Tagging Extension (MTE) is one hardware-based technology that has been introduced to improve memory safety on the ARM architecture efficiently. However, ARM MTE suffers from low entropy and side-channel attacks. Consequently, additional techniques are urgent to enhance protection against pointer misuse arising from memory corruption.
In this paper, we present Folded-Tag, a technique designed to efficiently safeguard pointers against unauthorized out-of-bounds access. Our method addresses the issue of low entropy 4-bit tag in ARM MTE, which makes the system vulnerable, by introducing folding and unfolding mechanisms for pointers. These mechanisms mitigate both speculative execution attacks and pointer guessing attacks. We implemented Folded-Tag in the LLVM compiler framework without requiring kernel modifications, making it suitable for deployment in systems supporting ARM MTE and Pointer Authentication (PA). To assess its effectiveness, we evaluated Folded-Tag on SPEC CPU2017 and NBench-byte benchmarks on an ARM-based Apple Silicon platform. We also applied Folded-Tag to real-world applications, including the NginX web server and ProFTPD FTP server, to demonstrate its compatibility and efficiency. Our experimental results show that Folded-Tag effectively mitigates attacks against existing hardware-assisted security features with a geometric mean performance overhead of less than 1%.
内存损坏漏洞,如超出边界的内存访问,被攻击者广泛利用来危害系统安全性。已经开发了许多基于软件的技术来防止此类漏洞,但它们通常需要在安全性和性能之间进行权衡。因此,内存标记扩展(Memory Tagging Extension, MTE)是一种基于硬件的技术,可以有效地提高ARM架构上的内存安全性。然而,ARM MTE存在低熵和侧信道攻击的问题。因此,迫切需要额外的技术来增强对内存损坏引起的指针误用的保护。在本文中,我们提出了一种折叠标签技术,旨在有效地保护指针免受未经授权的越界访问。我们的方法通过引入指针的折叠和展开机制,解决了ARM MTE中低熵4位标签的问题,这使得系统容易受到攻击。这些机制减轻了推测性执行攻击和指针猜测攻击。我们在LLVM编译器框架中实现了fold - tag,而不需要修改内核,使其适合部署在支持ARM MTE和指针身份验证(Pointer Authentication, PA)的系统中。为了评估其有效性,我们在SPEC CPU2017和基于arm的Apple Silicon平台上的nbench字节基准测试中评估了fold - tag。我们还将fold - tag应用于实际应用程序,包括NginX web服务器和ProFTPD FTP服务器,以展示其兼容性和效率。我们的实验结果表明,折叠标签有效地减轻了针对现有硬件辅助安全特征的攻击,几何平均性能开销小于1%。
{"title":"Folded-tag: Enhancing memory safety with efficient hardware-supported memory tagging","authors":"Sumin Yang,&nbsp;Hongjoo Jin,&nbsp;Wonsuk Choi,&nbsp;Dong Hoon Lee","doi":"10.1016/j.cose.2025.104822","DOIUrl":"10.1016/j.cose.2025.104822","url":null,"abstract":"<div><div>Memory corruption vulnerabilities, such as out-of-bound memory access, are widely exploited by attackers to compromise system security. Numerous software-based techniques have been developed to prevent such vulnerabilities, but they often require a trade-off between security and performance. In response, Memory Tagging Extension (MTE) is one hardware-based technology that has been introduced to improve memory safety on the ARM architecture efficiently. However, ARM MTE suffers from low entropy and side-channel attacks. Consequently, additional techniques are urgent to enhance protection against pointer misuse arising from memory corruption.</div><div>In this paper, we present Folded-Tag, a technique designed to efficiently safeguard pointers against unauthorized out-of-bounds access. Our method addresses the issue of low entropy 4-bit tag in ARM MTE, which makes the system vulnerable, by introducing <span>folding</span> and <span>unfolding</span> mechanisms for pointers. These mechanisms mitigate both speculative execution attacks and pointer guessing attacks. We implemented Folded-Tag in the LLVM compiler framework without requiring kernel modifications, making it suitable for deployment in systems supporting ARM MTE and Pointer Authentication (PA). To assess its effectiveness, we evaluated Folded-Tag on SPEC CPU2017 and NBench-byte benchmarks on an ARM-based Apple Silicon platform. We also applied Folded-Tag to real-world applications, including the NginX web server and ProFTPD FTP server, to demonstrate its compatibility and efficiency. Our experimental results show that Folded-Tag effectively mitigates attacks against existing hardware-assisted security features with a geometric mean performance overhead of less than 1%.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104822"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public auditing with semantic secure data privacy for low-entropy files in cloud storage 云存储中低熵文件的语义安全数据隐私公共审计
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2026-01-08 DOI: 10.1016/j.cose.2026.104826
Xiao Tan , Qi Xie , Lidong Han , Shengbao Wang
Public auditing enables a third-party auditor delegated by the data owner to efficiently verify the integrity of data outsourced to a remote server, and thus suits for numerous applications in cloud storage. By a comprehensive survey on the literature, we found that none of existing public auditing schemes provide semantic security of data privacy, namely low-entropy data cannot preserve indistinguishability against the auditor. To capture this security weakness, we define the notion public auditing with semantic secure data privacy (PA-SSDP) by a formal adversarial model to guarantee that it is impossible for the auditor to learn any non-trivial information about the data, even if the audited file has only two possible versions. Then we propose a concrete PA-SSDP scheme with two variants of provable security under the new model, which offer improved data privacy and the same level of efficiency as most of related works. Besides, our schemes support some other useful features, such as server-side deduplication, dynamic data update, and batch auditing.
公共审计使数据所有者委托的第三方审计员能够有效地验证外包给远程服务器的数据的完整性,因此适用于云存储中的许多应用程序。通过对文献的全面调查,我们发现现有的公共审计方案都没有提供数据隐私的语义安全,即低熵数据不能对审计员保持不可区分性。为了抓住这个安全弱点,我们通过正式的对抗性模型定义了带有语义安全数据隐私(PA-SSDP)的公共审计概念,以保证审计人员不可能了解有关数据的任何重要信息,即使被审计的文件只有两个可能的版本。然后,我们提出了一个具体的PA-SSDP方案,该方案在新模型下具有两个可证明安全性的变体,该方案提供了改进的数据隐私性和与大多数相关工作相同的效率水平。此外,我们的方案还支持其他一些有用的特性,如服务器端重复数据删除、动态数据更新和批处理审计。
{"title":"Public auditing with semantic secure data privacy for low-entropy files in cloud storage","authors":"Xiao Tan ,&nbsp;Qi Xie ,&nbsp;Lidong Han ,&nbsp;Shengbao Wang","doi":"10.1016/j.cose.2026.104826","DOIUrl":"10.1016/j.cose.2026.104826","url":null,"abstract":"<div><div>Public auditing enables a third-party auditor delegated by the data owner to efficiently verify the integrity of data outsourced to a remote server, and thus suits for numerous applications in cloud storage. By a comprehensive survey on the literature, we found that none of existing public auditing schemes provide semantic security of data privacy, namely low-entropy data cannot preserve indistinguishability against the auditor. To capture this security weakness, we define the notion <em>public auditing with semantic secure data privacy</em> (PA-SSDP) by a formal adversarial model to guarantee that it is impossible for the auditor to learn any non-trivial information about the data, even if the audited file has only two possible versions. Then we propose a concrete PA-SSDP scheme with two variants of provable security under the new model, which offer improved data privacy and the same level of efficiency as most of related works. Besides, our schemes support some other useful features, such as server-side deduplication, dynamic data update, and batch auditing.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104826"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificate revocation – search for a way forward 证书撤销-寻找前进的道路
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2026-01-03 DOI: 10.1016/j.cose.2025.104814
Takahito Yoshizawa , Himanshu Agarwal , Dave Singelée , Bart Preneel
Revocation of digital certificates represents a series of improvements by IETF in order to standardize a complete and effective solution. This applies to the context of Internet web sites in which web servers and browsers use digital certificates to establish Transport Layer Security (TLS). Despite IETF’s effort over the years to establish a reliable revocation mechanism, including Certificate Revocation List (CRL), Online Certificate Status Protocol (OCSP) and its variants, various technical issues hinder complete resolution of the revocation problem. At the same time, all major browser vendors implement their own proprietary solutions to address the revocation problem. As a result, revocation solutions are fragmented, incomplete, and ineffective, and the level of real-world acceptance of standardized solutions is limited. To address this situation, in 2020, IETF has introduced short-term certificate concept to avoid revocation altogether. It is called Support for Short-Term, Automatically Renewed (STAR) which recommends a validity period of 4 days. To measure the level of adoption of this new approach in the Internet, we collected and analyzed web server certificates from 1 million websites; the result of our extensive analysis indicates that this scheme has not gained traction in reality. In fact, we found no implementation of a 4-day validity period out of more than 1.5 million server certificates that we collected. This situation indicates that the latest IETF effort to promote short-term certificates has not materialized, with no clear alternative solution in sight to resolve the revocation issue. We present our insights into the reasons for this absence of traction in reality and present our view of a possible way forward.
数字证书的撤销代表了IETF为了标准化一个完整有效的解决方案而进行的一系列改进。这适用于网络服务器和浏览器使用数字证书建立传输层安全性(TLS)的Internet网站环境。尽管IETF多年来一直在努力建立可靠的吊销机制,包括证书吊销列表(CRL)、在线证书状态协议(OCSP)及其变体,但各种技术问题阻碍了吊销问题的彻底解决。与此同时,所有主要的浏览器供应商都实现了自己的专有解决方案来解决吊销问题。因此,撤销解决方案是碎片化的、不完整的和无效的,并且标准化解决方案的实际接受程度是有限的。为了解决这种情况,IETF在2020年引入了短期证书概念,以避免完全撤销。它被称为支持短期自动更新(STAR),建议有效期为4天。为了衡量这种新方法在互联网上的采用程度,我们收集并分析了100万个网站的web服务器证书;我们广泛分析的结果表明,这个方案在现实中没有得到支持。事实上,在我们收集的150多万个服务器证书中,我们没有发现4天有效期的实现。这种情况表明,IETF推动短期证书的最新努力尚未实现,目前还没有明确的替代解决方案来解决吊销问题。我们对现实中缺乏吸引力的原因提出了我们的见解,并提出了我们对可能的前进方向的看法。
{"title":"Certificate revocation – search for a way forward","authors":"Takahito Yoshizawa ,&nbsp;Himanshu Agarwal ,&nbsp;Dave Singelée ,&nbsp;Bart Preneel","doi":"10.1016/j.cose.2025.104814","DOIUrl":"10.1016/j.cose.2025.104814","url":null,"abstract":"<div><div>Revocation of digital certificates represents a series of improvements by IETF in order to standardize a complete and effective solution. This applies to the context of Internet web sites in which web servers and browsers use digital certificates to establish Transport Layer Security (TLS). Despite IETF’s effort over the years to establish a reliable revocation mechanism, including Certificate Revocation List (CRL), Online Certificate Status Protocol (OCSP) and its variants, various technical issues hinder complete resolution of the revocation problem. At the same time, all major browser vendors implement their own proprietary solutions to address the revocation problem. As a result, revocation solutions are fragmented, incomplete, and ineffective, and the level of real-world acceptance of standardized solutions is limited. To address this situation, in 2020, IETF has introduced <em>short-term certificate</em> concept to avoid revocation altogether. It is called Support for Short-Term, Automatically Renewed (STAR) which recommends a validity period of 4 days. To measure the level of adoption of this new approach in the Internet, we collected and analyzed web server certificates from 1 million websites; the result of our extensive analysis indicates that this scheme has not gained traction in reality. In fact, we found no implementation of a 4-day validity period out of more than 1.5 million server certificates that we collected. This situation indicates that the latest IETF effort to promote short-term certificates has not materialized, with no clear alternative solution in sight to resolve the revocation issue. We present our insights into the reasons for this absence of traction in reality and present our view of a possible way forward.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104814"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis GLRA:通过最小传输成本路径分析的基于图的泄漏风险评估
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2025-12-29 DOI: 10.1016/j.cose.2025.104816
Xing Hu , Yang Zhang , Sheng Liu , Xiaowen Chen , Yaohua Wang , Shaoqing Li , Zhenyu Zhao , Keqin Li
As integrated circuits are increasingly deployed in security-critical applications, assessing the risk of information leakage introduced during the design phase has become a key challenge. Logic-level structures may inadvertently enable sensitive data to propagate to externally observable points, posing serious security risks. Although anomaly-based techniques such as taint tracking and machine learning have been developed to detect or mitigate leakage threats, the absence of a unified and quantitative metric for evaluating leakage risk remains a major limitation. Without such a metric, existing methods can neither effectively identify real threats nor compare the effectiveness of protection strategies in a principled manner, leading to limited reliability and comparability in hardware security analysis.
To overcome these challenges, we propose GLRA, a graph-based methodology for leakage risk assessment via minimal transmission cost path analysis. Departing from the traditional “path existence” criterion used in anomaly label-based taint tracking, GLRA quantifies leakage risk by evaluating the difficulty of information propagation. A central premise of GLRA is that the transmission cost-defined as the effort required to propagate signals from sensitive sources to observable outputs-is inversely correlated with leakage likelihood: lower costs imply higher risks. Accordingly, we define controllability-based transmission cost metrics for basic logical units such as AND, OR, NOT, and DFF, which quantify the propagation effort imposed by each logic unit. By modeling the circuit as an edge-weighted graph where edges are annotated with the aforementioned transmission cost values, GLRA identifies the minimal path from sensitive sources to potential leakage points. In addition, to accurately quantify the risk of leakage, GLRA establishes a formulaic correlation between the transmission cost and the design’s overall risk of information leakage. Experiments on cryptographic cores, debug infrastructure, and non-cryptographic logic demonstrate that GLRA accurately quantifies maximum-risk leakage paths, achieving a 18.75% improvement in detection precision over traditional anomaly-based approaches. GLRA correctly determines the presence or absence of leakage risks across all 16 evaluated benchmarks. Furthermore, it supports comparative analysis of leakage mitigation strategies across diverse hardware designs, providing quantitative insights into the effectiveness of protection mechanisms.
随着集成电路越来越多地部署在安全关键应用中,评估设计阶段引入的信息泄漏风险已成为一个关键挑战。逻辑级结构可能会无意中使敏感数据传播到外部可观察点,从而带来严重的安全风险。尽管基于异常的技术(如污染跟踪和机器学习)已经被开发用于检测或减轻泄漏威胁,但缺乏统一的定量指标来评估泄漏风险仍然是一个主要限制。如果没有这样的度量,现有的方法既不能有效地识别真实的威胁,也不能有原则地比较保护策略的有效性,导致硬件安全分析的可靠性和可比性有限。为了克服这些挑战,我们提出了GLRA,这是一种基于图的方法,通过最小传输成本路径分析来评估泄漏风险。与传统的基于异常标签的污染跟踪的“路径存在性”准则不同,GLRA通过评估信息传播的难易程度来量化泄漏风险。GLRA的一个中心前提是传输成本(定义为将信号从敏感源传播到可观察输出所需的努力)与泄漏可能性成反比:成本越低意味着风险越高。因此,我们为基本逻辑单元(如AND、OR、NOT和DFF)定义了基于可控性的传输成本指标,这些指标量化了每个逻辑单元施加的传播努力。通过将电路建模为一个边加权图,其中边标注了上述传输成本值,GLRA确定了从敏感源到潜在泄漏点的最小路径。此外,为了准确量化泄漏风险,GLRA建立了传输成本与设计总体信息泄漏风险之间的关系式。在加密核心、调试基础设施和非加密逻辑上的实验表明,GLRA准确地量化了最大风险泄漏路径,与传统的基于异常的方法相比,检测精度提高了18.75%。GLRA在所有16个评估基准中正确确定是否存在泄漏风险。此外,它支持跨不同硬件设计的泄漏缓解策略的比较分析,为保护机制的有效性提供定量见解。
{"title":"GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis","authors":"Xing Hu ,&nbsp;Yang Zhang ,&nbsp;Sheng Liu ,&nbsp;Xiaowen Chen ,&nbsp;Yaohua Wang ,&nbsp;Shaoqing Li ,&nbsp;Zhenyu Zhao ,&nbsp;Keqin Li","doi":"10.1016/j.cose.2025.104816","DOIUrl":"10.1016/j.cose.2025.104816","url":null,"abstract":"<div><div>As integrated circuits are increasingly deployed in security-critical applications, assessing the risk of information leakage introduced during the design phase has become a key challenge. Logic-level structures may inadvertently enable sensitive data to propagate to externally observable points, posing serious security risks. Although anomaly-based techniques such as taint tracking and machine learning have been developed to detect or mitigate leakage threats, the absence of a unified and quantitative metric for evaluating leakage risk remains a major limitation. Without such a metric, existing methods can neither effectively identify real threats nor compare the effectiveness of protection strategies in a principled manner, leading to limited reliability and comparability in hardware security analysis.</div><div>To overcome these challenges, we propose GLRA, a graph-based methodology for leakage risk assessment via minimal transmission cost path analysis. Departing from the traditional “path existence” criterion used in anomaly label-based taint tracking, GLRA quantifies leakage risk by evaluating the difficulty of information propagation. A central premise of GLRA is that the transmission cost-defined as the effort required to propagate signals from sensitive sources to observable outputs-is inversely correlated with leakage likelihood: lower costs imply higher risks. Accordingly, we define controllability-based transmission cost metrics for basic logical units such as AND, OR, NOT, and DFF, which quantify the propagation effort imposed by each logic unit. By modeling the circuit as an edge-weighted graph where edges are annotated with the aforementioned transmission cost values, GLRA identifies the minimal path from sensitive sources to potential leakage points. In addition, to accurately quantify the risk of leakage, GLRA establishes a formulaic correlation between the transmission cost and the design’s overall risk of information leakage. Experiments on cryptographic cores, debug infrastructure, and non-cryptographic logic demonstrate that GLRA accurately quantifies maximum-risk leakage paths, achieving a 18.75% improvement in detection precision over traditional anomaly-based approaches. GLRA correctly determines the presence or absence of leakage risks across all 16 evaluated benchmarks. Furthermore, it supports comparative analysis of leakage mitigation strategies across diverse hardware designs, providing quantitative insights into the effectiveness of protection mechanisms.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104816"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SemTaint: A scalable taint analysis approach for JavaWeb frameworks and composite containers SemTaint:用于JavaWeb框架和复合容器的可伸缩的污点分析方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2026-01-03 DOI: 10.1016/j.cose.2025.104821
Haotian Huang , Ruibin Yan , Jian Gao
Static taint analysis serves as a fundamental technique for detecting security vulnerabilities in JavaWeb applications. However, existing approaches suffer from two critical limitations. First, incomplete modeling of framework mechanisms results in unsound call graphs and value flows. Second, element-insensitive analysis of composite containers leads to imprecise data flows and over-taint. To address these limitations, we propose SemTaint, a unified scalable taint analysis approach based on pointer analysis systems. SemTaint enhances Anderson-style analysis through two key innovations. First, we design rule-based framework modeling that captures implicit data and control flows introduced by JavaWeb mechanisms including dependency injection, dynamic proxy, and data persistence frameworks. Second, we develop the on-demand and element-sensitive container modeling based on the access pattern, which integrates the semantic model, access pattern abstraction and sparse tracking model. It efficiently maintains precision against dynamic state changes, thereby balancing scalability and accuracy. Our evaluation on 20 real-world JavaWeb applications demonstrates that SemTaint achieves higher coverage of intra-app reachable methods, while reducing analysis time by an average of 56.4 % compared to state-of-the-art approach. In precision testing on composite containers, SemTaint achieves 96.7 % accuracy and 100 % recall, substantially outperforming FlowDroid (67.6 % accuracy, 82.8 % recall) and Tai-e (65.7 % accuracy, 79.3 % recall). On security benchmarks, SemTaint attains perfect vulnerability detection recall while maintaining superior efficiency. Case studies on real-world vulnerabilities further confirm SemTaint’s effectiveness in detecting taint flows.
静态污染分析是检测JavaWeb应用程序中的安全漏洞的基本技术。然而,现有的方法有两个关键的局限性。首先,不完整的框架机制建模导致不健全的调用图和价值流。其次,复合容器的元素不敏感分析导致数据流不精确和过度污染。为了解决这些限制,我们提出了SemTaint,一个基于指针分析系统的统一的可扩展的污染分析方法。SemTaint通过两个关键创新增强了anderson风格的分析。首先,我们设计基于规则的框架建模,捕获由JavaWeb机制引入的隐式数据和控制流,这些机制包括依赖注入、动态代理和数据持久性框架。其次,开发了基于访问模式的按需、元素敏感的容器模型,该模型集成了语义模型、访问模式抽象模型和稀疏跟踪模型;它有效地保持了对动态状态变化的精度,从而平衡了可伸缩性和准确性。我们对20个真实的JavaWeb应用程序的评估表明,SemTaint实现了应用程序内部可访问方法的更高覆盖率,同时与最先进的方法相比,平均减少了56.4% %的分析时间。在复合容器的精度测试中,SemTaint达到了96.7 %的准确率和100 %的召回率,大大优于FlowDroid(67.6% %的准确率,82.8 %的召回率)和Tai-e(65.7 %的准确率,79.3% %的召回率)。在安全基准测试中,SemTaint实现了完美的漏洞检测召回,同时保持了优越的效率。对真实世界漏洞的案例研究进一步证实了SemTaint在检测污染流方面的有效性。
{"title":"SemTaint: A scalable taint analysis approach for JavaWeb frameworks and composite containers","authors":"Haotian Huang ,&nbsp;Ruibin Yan ,&nbsp;Jian Gao","doi":"10.1016/j.cose.2025.104821","DOIUrl":"10.1016/j.cose.2025.104821","url":null,"abstract":"<div><div>Static taint analysis serves as a fundamental technique for detecting security vulnerabilities in JavaWeb applications. However, existing approaches suffer from two critical limitations. First, incomplete modeling of framework mechanisms results in unsound call graphs and value flows. Second, element-insensitive analysis of composite containers leads to imprecise data flows and over-taint. To address these limitations, we propose SemTaint, a unified scalable taint analysis approach based on pointer analysis systems. SemTaint enhances Anderson-style analysis through two key innovations. First, we design rule-based framework modeling that captures implicit data and control flows introduced by JavaWeb mechanisms including dependency injection, dynamic proxy, and data persistence frameworks. Second, we develop the on-demand and element-sensitive container modeling based on the access pattern, which integrates the semantic model, access pattern abstraction and sparse tracking model. It efficiently maintains precision against dynamic state changes, thereby balancing scalability and accuracy. Our evaluation on 20 real-world JavaWeb applications demonstrates that SemTaint achieves higher coverage of intra-app reachable methods, while reducing analysis time by an average of 56.4 % compared to state-of-the-art approach. In precision testing on composite containers, SemTaint achieves 96.7 % accuracy and 100 % recall, substantially outperforming FlowDroid (67.6 % accuracy, 82.8 % recall) and Tai-e (65.7 % accuracy, 79.3 % recall). On security benchmarks, SemTaint attains perfect vulnerability detection recall while maintaining superior efficiency. Case studies on real-world vulnerabilities further confirm SemTaint’s effectiveness in detecting taint flows.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104821"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive view of software vulnerability risks through enterprise knowledge graphs 通过企业知识图谱全面了解软件漏洞风险
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2026-01-02 DOI: 10.1016/j.cose.2025.104815
Mikel Egaña Aranguren , Jesualdo Tomás Fernández-Breis , Bidane Leon Balentzia , Markus Rompe , Alexander García Castro
Cybersecurity has emerged as a critical concern for modern enterprises due to the increasing complexity and diversity of threats. These risks exploit multiple attack vectors, such as phishing, unpatched vulnerabilities, and malware distribution, necessitating a comprehensive and unified approach to threat modeling. However, cybersecurity data is often siloed across disparate sources–ranging from JSON vulnerability reports (e.g., Amazon Inspector, CycloneDX) and dependency files (e.g., NPM) to relational databases and manual assessments–making integration a significant challenge. Knowledge Graphs offer the technological framework to successfully integrate disparate data. This work presents a KG-based solution for software vulnerability data integration at Siemens Energy, leveraging Enterprise Knowledge Graphs to unify heterogeneous datasets under a shared semantic model. Our approach consists of: (1) a Cybersecurity Ontology Network defining core entities and relationships, (2) an automated pipeline converting diverse data sources into a (3) scalable EKG that enables advanced threat analysis, and (4) competency questions and data quality rules validating the system’s effectiveness. By adopting a Data-Centric Architecture, EKGs provide a flexible, future-proof framework for cybersecurity intelligence, overcoming the limitations of traditional Application-Centric systems, and ultimately providing FAIR data (Findable, Accessible, Interoperable, Reusable). This work offers actionable insights for organizations seeking to enhance cyber threat visibility while managing complex, evolving data landscapes.
由于威胁的复杂性和多样性日益增加,网络安全已成为现代企业的一个关键问题。这些风险利用多种攻击向量,例如网络钓鱼、未修补的漏洞和恶意软件分发,因此需要一种全面而统一的威胁建模方法。然而,网络安全数据通常分散在不同的数据源中,从JSON漏洞报告(例如Amazon Inspector, CycloneDX)和依赖文件(例如NPM)到关系数据库和手动评估,这使得集成成为一个重大挑战。知识图谱提供了成功集成不同数据的技术框架。这项工作提出了一种基于kg的解决方案,用于西门子能源公司的软件漏洞数据集成,利用企业知识图在共享语义模型下统一异构数据集。我们的方法包括:(1)定义核心实体和关系的网络安全本体网络,(2)将不同数据源转换为(3)可扩展的EKG(支持高级威胁分析)的自动化管道,以及(4)验证系统有效性的能力问题和数据质量规则。通过采用以数据为中心的架构,EKGs为网络安全智能提供了一个灵活的、面向未来的框架,克服了传统以应用为中心的系统的局限性,并最终提供FAIR数据(可查找、可访问、可互操作、可重用)。这项工作为寻求在管理复杂、不断发展的数据环境的同时提高网络威胁可见性的组织提供了可操作的见解。
{"title":"A comprehensive view of software vulnerability risks through enterprise knowledge graphs","authors":"Mikel Egaña Aranguren ,&nbsp;Jesualdo Tomás Fernández-Breis ,&nbsp;Bidane Leon Balentzia ,&nbsp;Markus Rompe ,&nbsp;Alexander García Castro","doi":"10.1016/j.cose.2025.104815","DOIUrl":"10.1016/j.cose.2025.104815","url":null,"abstract":"<div><div>Cybersecurity has emerged as a critical concern for modern enterprises due to the increasing complexity and diversity of threats. These risks exploit multiple attack vectors, such as phishing, unpatched vulnerabilities, and malware distribution, necessitating a comprehensive and unified approach to threat modeling. However, cybersecurity data is often siloed across disparate sources–ranging from JSON vulnerability reports (e.g., Amazon Inspector, CycloneDX) and dependency files (e.g., NPM) to relational databases and manual assessments–making integration a significant challenge. Knowledge Graphs offer the technological framework to successfully integrate disparate data. This work presents a KG-based solution for software vulnerability data integration at Siemens Energy, leveraging Enterprise Knowledge Graphs to unify heterogeneous datasets under a shared semantic model. Our approach consists of: (1) a Cybersecurity Ontology Network defining core entities and relationships, (2) an automated pipeline converting diverse data sources into a (3) scalable EKG that enables advanced threat analysis, and (4) competency questions and data quality rules validating the system’s effectiveness. By adopting a Data-Centric Architecture, EKGs provide a flexible, future-proof framework for cybersecurity intelligence, overcoming the limitations of traditional Application-Centric systems, and ultimately providing FAIR data (Findable, Accessible, Interoperable, Reusable). This work offers actionable insights for organizations seeking to enhance cyber threat visibility while managing complex, evolving data landscapes.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104815"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review RISC-V物联网设备运行时安全的攻击、防御和展望:综述
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2026-01-02 DOI: 10.1016/j.cose.2025.104817
Wei Wang , Weike Wang , Jiameng Liu , Lin Li , Bingzheng Li , Zirui Liu , Xiang Wang
With the extensive application of embedded devices in daily life, the security issues have gained escalating significance. There are numerous researches and countermeasures dealing with the security problems of mainstream processor architectures. As an emerging Instruction Set Architecture (ISA), RISC-V has drawn widespread attention owing to its openness, flexibility, and extensibility. With its popularization in diverse fields, ensuring the security becomes crucially important. Aiming at the runtime security of RISC-V IoT devices, this paper reviews all the published papers in RISC-V security, and investigates three mainstream attack approaches and corresponding defense solutions. We analyze five common side-channel attacks with distinct attack focuses, categorize defense schemes into three types based on different levels and strategies of defense technology, and summarize several existing defense schemes on RISC-V platforms. Then, in the context of program vulnerability exploitation attacks, we present the attack process and offer a comprehensive overview and comparison of hardware-assisted defense mechanisms that have been implemented on RISC-V platforms in the recent years. This analysis is carried out from four key strategies, namely Code Integrity, Control Flow Integrity, Data Flow Integrity, and Information Confidentiality. For higher-level network attacks that are less correlated with the underlying ISA, we provide a brief statement and introduce two mainstream mechanisms, namely Intrusion Detection System and Data Encryption. Besides, this paper offers the critical perspectives and future development directions for the defense strategies corresponding to each type of attack. It is convinced that this review will act as a valuable resource for fellow researchers in RISC-V security.
随着嵌入式设备在日常生活中的广泛应用,其安全问题日益凸显。针对主流处理器体系结构的安全问题,已有大量的研究和对策。RISC-V作为一种新兴的指令集架构(ISA),因其开放性、灵活性和可扩展性而受到广泛关注。随着其在各个领域的普及,确保安全变得至关重要。针对RISC-V物联网设备的运行时安全问题,本文回顾了所有已发表的RISC-V安全方面的论文,研究了三种主流的攻击方式和相应的防御方案。分析了五种常见的侧边信道攻击,各有不同的攻击重点,根据防御技术的不同层次和策略,将防御方案分为三种类型,并总结了RISC-V平台上现有的几种防御方案。然后,在程序漏洞利用攻击的背景下,给出了攻击过程,并对近年来在RISC-V平台上实现的硬件辅助防御机制进行了全面的概述和比较。该分析从四个关键策略进行,即代码完整性、控制流完整性、数据流完整性和信息保密性。对于与底层ISA相关性较小的高级网络攻击,我们简要介绍了两种主流机制,即入侵检测系统和数据加密。并针对每种攻击类型提出了相应的防御策略的关键视角和未来发展方向。相信本综述将为RISC-V安全领域的研究人员提供宝贵的资源。
{"title":"Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review","authors":"Wei Wang ,&nbsp;Weike Wang ,&nbsp;Jiameng Liu ,&nbsp;Lin Li ,&nbsp;Bingzheng Li ,&nbsp;Zirui Liu ,&nbsp;Xiang Wang","doi":"10.1016/j.cose.2025.104817","DOIUrl":"10.1016/j.cose.2025.104817","url":null,"abstract":"<div><div>With the extensive application of embedded devices in daily life, the security issues have gained escalating significance. There are numerous researches and countermeasures dealing with the security problems of mainstream processor architectures. As an emerging Instruction Set Architecture (ISA), RISC-V has drawn widespread attention owing to its openness, flexibility, and extensibility. With its popularization in diverse fields, ensuring the security becomes crucially important. Aiming at the runtime security of RISC-V IoT devices, this paper reviews all the published papers in RISC-V security, and investigates three mainstream attack approaches and corresponding defense solutions. We analyze five common side-channel attacks with distinct attack focuses, categorize defense schemes into three types based on different levels and strategies of defense technology, and summarize several existing defense schemes on RISC-V platforms. Then, in the context of program vulnerability exploitation attacks, we present the attack process and offer a comprehensive overview and comparison of hardware-assisted defense mechanisms that have been implemented on RISC-V platforms in the recent years. This analysis is carried out from four key strategies, namely Code Integrity, Control Flow Integrity, Data Flow Integrity, and Information Confidentiality. For higher-level network attacks that are less correlated with the underlying ISA, we provide a brief statement and introduce two mainstream mechanisms, namely Intrusion Detection System and Data Encryption. Besides, this paper offers the critical perspectives and future development directions for the defense strategies corresponding to each type of attack. It is convinced that this review will act as a valuable resource for fellow researchers in RISC-V security.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104817"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review on adversarial thinking in cyber security education: Themes and potential frameworks 网络安全教育中对抗性思维的系统回顾:主题和潜在框架
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2025-12-10 DOI: 10.1016/j.cose.2025.104803
Thomas Oakley Browne, Eric Pardede
Background: Adversarial thinking is a key component of cybersecurity education, yet its definition and effective teaching approaches remain unclear. This study aims to clarify this concept and provide directions for future research in cybersecurity education.
Methods: A systematic review and thematic analysis were conducted to examine the relevant literature. The study focused on identifying descriptive and analytical themes, as well as potential frameworks for instruction.
Results: A total of 95 articles were analysed, yielding 89 concepts grouped into 4 main themes and 15 sub-themes. Analysis identified 2 analytical themes and 17 frameworks utilised in interventions.
Discussion: The identified themes provide a basis for defining learning objectives and developing validated assessments. While some frameworks show promise, they are most effective for specific aspects of adversarial thinking. The creation of an overarching educational framework is recommended.
背景:对抗性思维是网络安全教育的关键组成部分,但其定义和有效的教学方法尚不清楚。本研究旨在厘清这一概念,为未来网络安全教育的研究提供方向。方法:对相关文献进行系统回顾和专题分析。这项研究的重点是确定描述性和分析性主题,以及可能的教学框架。结果:共分析95篇文章,产生89个概念,分为4个主题和15个副主题。分析确定了干预措施中使用的2个分析主题和17个框架。讨论:确定的主题为定义学习目标和开发有效的评估提供了基础。虽然一些框架显示出希望,但它们对对抗性思维的特定方面最有效。建议建立一个全面的教育框架。
{"title":"A systematic review on adversarial thinking in cyber security education: Themes and potential frameworks","authors":"Thomas Oakley Browne,&nbsp;Eric Pardede","doi":"10.1016/j.cose.2025.104803","DOIUrl":"10.1016/j.cose.2025.104803","url":null,"abstract":"<div><div><em>Background:</em> Adversarial thinking is a key component of cybersecurity education, yet its definition and effective teaching approaches remain unclear. This study aims to clarify this concept and provide directions for future research in cybersecurity education.</div><div><em>Methods:</em> A systematic review and thematic analysis were conducted to examine the relevant literature. The study focused on identifying descriptive and analytical themes, as well as potential frameworks for instruction.</div><div><em>Results:</em> A total of 95 articles were analysed, yielding 89 concepts grouped into 4 main themes and 15 sub-themes. Analysis identified 2 analytical themes and 17 frameworks utilised in interventions.</div><div><em>Discussion:</em> The identified themes provide a basis for defining learning objectives and developing validated assessments. While some frameworks show promise, they are most effective for specific aspects of adversarial thinking. The creation of an overarching educational framework is recommended.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104803"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145897888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on network flow watermarking: A problem-oriented perspective 基于问题导向的网络流水印研究综述
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2025-12-31 DOI: 10.1016/j.cose.2025.104813
Tengyao Li , Kaiyue Liu , Shaoyong Du
Network flow watermarking is an active tracing approach by embedding the source node identity information into network flows invisibly. The embedded watermarks coexist with the original network traffic, which are designed with robustness against network noises and active interferences. In recent years, network flow watermarking enters a phase of profound development in face of various challenges on practical applications (e.g. deanonymization, data leakage tracing, malicious behavior monitoring) in Internet. However, to our best knowledge, there are very few surveys for the network flow watermarking methods after 2018, for which the systematic survey covering the entire developments is absent. Meanwhile, current surveys classify and analyze network flow watermarking based on embedding patterns, which ignore different methods correlations on critical problems for watermarking. To this end, the paper reviews and analyzes the papers from 2001 to 2025 on network flow watermarking in perspective of problem-orientations. The threat model and theoretical framework are established to model the watermarking embedding and detecting procedures, which offer a consistent model for watermarking design. From three core problems on robustness, invisibility and adaptation, network flow watermarking methods are classified into different solutions to these problems, which depict an explicit network flow watermarking development roadmap. For sake of facilitating practical applications, five open problems as the critical challenges are discussed, providing references for the future work on network flow watermarking.
网络流水印是一种将源节点身份信息不可见地嵌入到网络流中的主动跟踪方法。嵌入的水印与原始网络流量共存,具有抗网络噪声和有源干扰的鲁棒性。近年来,网络流量水印技术在互联网的实际应用中面临着去匿名化、数据泄露跟踪、恶意行为监控等诸多挑战,进入了一个深刻发展的阶段。然而,据我们所知,2018年以后针对网络流量水印方法的调查很少,缺乏涵盖整个发展的系统调查。同时,现有的研究基于嵌入模式对网络流水印进行分类和分析,忽略了不同方法在水印关键问题上的相关性。为此,本文从问题导向的角度对2001 - 2025年有关网络流量水印的论文进行了综述和分析。建立了对水印嵌入和检测过程进行建模的威胁模型和理论框架,为水印设计提供了统一的模型。从鲁棒性、不可见性和自适应三个核心问题出发,对网络流水印方法进行了分类,给出了不同的解决方案,描绘了网络流水印的发展路线图。为了便于实际应用,本文讨论了五个开放性问题作为关键挑战,为今后网络流水印的研究提供参考。
{"title":"A survey on network flow watermarking: A problem-oriented perspective","authors":"Tengyao Li ,&nbsp;Kaiyue Liu ,&nbsp;Shaoyong Du","doi":"10.1016/j.cose.2025.104813","DOIUrl":"10.1016/j.cose.2025.104813","url":null,"abstract":"<div><div>Network flow watermarking is an active tracing approach by embedding the source node identity information into network flows invisibly. The embedded watermarks coexist with the original network traffic, which are designed with robustness against network noises and active interferences. In recent years, network flow watermarking enters a phase of profound development in face of various challenges on practical applications (e.g. deanonymization, data leakage tracing, malicious behavior monitoring) in Internet. However, to our best knowledge, there are very few surveys for the network flow watermarking methods after 2018, for which the systematic survey covering the entire developments is absent. Meanwhile, current surveys classify and analyze network flow watermarking based on embedding patterns, which ignore different methods correlations on critical problems for watermarking. To this end, the paper reviews and analyzes the papers from 2001 to 2025 on network flow watermarking in perspective of problem-orientations. The threat model and theoretical framework are established to model the watermarking embedding and detecting procedures, which offer a consistent model for watermarking design. From three core problems on robustness, invisibility and adaptation, network flow watermarking methods are classified into different solutions to these problems, which depict an explicit network flow watermarking development roadmap. For sake of facilitating practical applications, five open problems as the critical challenges are discussed, providing references for the future work on network flow watermarking.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104813"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145897840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memory under siege: A comprehensive survey of side-Channel attacks on memory 围攻下的内存:对内存侧通道攻击的全面调查
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-04-01 Epub Date: 2025-12-30 DOI: 10.1016/j.cose.2025.104810
Mahady Hassan , Shanto Roy , Reza Rahaeimehr
Side-channel attacks on memory (SCAM) exploit unintended data leaks from memory subsystems to infer sensitive information, posing significant threats to system security. These attacks exploit vulnerabilities in memory access patterns, cache behaviors, and other microarchitectural features to bypass traditional security measures. The purpose of this research is to examine SCAM, classify various attack techniques, and evaluate existing defense mechanisms. It guides researchers and industry professionals in improving memory security and mitigating emerging threats. We begin by identifying the major vulnerabilities in the memory system that are frequently exploited in SCAM, such as cache timing, speculative execution, Rowhammer, and other sophisticated approaches. Next, we outline a comprehensive taxonomy that systematically classifies these attacks based on their types, target systems, attack vectors, and adversarial capabilities required to execute them. In addition, we review the current landscape of mitigation strategies, emphasizing their strengths and limitations. This work aims to provide a comprehensive overview of memory-based side-channel attacks with the goal of providing significant insights for researchers and practitioners to better understand, detect, and mitigate SCAM risks.
内存侧信道攻击(SCAM)利用内存子系统的意外数据泄漏来推断敏感信息,对系统安全构成重大威胁。这些攻击利用内存访问模式、缓存行为和其他微架构特性中的漏洞来绕过传统的安全措施。本研究的目的是检查诈骗,分类各种攻击技术,并评估现有的防御机制。它指导研究人员和行业专业人士提高内存安全性和减轻新出现的威胁。我们首先确定内存系统中经常被骗局利用的主要漏洞,例如缓存定时、推测执行、Rowhammer和其他复杂的方法。接下来,我们概述了一个全面的分类法,该分类法根据攻击类型、目标系统、攻击向量和执行攻击所需的对抗能力对这些攻击进行系统分类。此外,我们回顾了缓解战略的现状,强调了它们的优势和局限性。这项工作旨在提供基于内存的侧通道攻击的全面概述,为研究人员和从业者提供重要的见解,以更好地理解、检测和减轻诈骗风险。
{"title":"Memory under siege: A comprehensive survey of side-Channel attacks on memory","authors":"Mahady Hassan ,&nbsp;Shanto Roy ,&nbsp;Reza Rahaeimehr","doi":"10.1016/j.cose.2025.104810","DOIUrl":"10.1016/j.cose.2025.104810","url":null,"abstract":"<div><div>Side-channel attacks on memory (SCAM) exploit unintended data leaks from memory subsystems to infer sensitive information, posing significant threats to system security. These attacks exploit vulnerabilities in memory access patterns, cache behaviors, and other microarchitectural features to bypass traditional security measures. The purpose of this research is to examine SCAM, classify various attack techniques, and evaluate existing defense mechanisms. It guides researchers and industry professionals in improving memory security and mitigating emerging threats. We begin by identifying the major vulnerabilities in the memory system that are frequently exploited in SCAM, such as cache timing, speculative execution, <em>Rowhammer</em>, and other sophisticated approaches. Next, we outline a comprehensive taxonomy that systematically classifies these attacks based on their types, target systems, attack vectors, and adversarial capabilities required to execute them. In addition, we review the current landscape of mitigation strategies, emphasizing their strengths and limitations. This work aims to provide a comprehensive overview of memory-based side-channel attacks with the goal of providing significant insights for researchers and practitioners to better understand, detect, and mitigate SCAM risks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104810"},"PeriodicalIF":5.4,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1