Category: Cybersecurity

Format String Vulnerabilities

Format string vulnerabilities occur when a computer program allows user input to control the formatting of text output, often with functions that expect a specific format string. If the program does not properly check or restrict this input, attackers can use special formatting characters to read or write memory, potentially exposing sensitive information or causing…

Control Flow Integrity

Control Flow Integrity, or CFI, is a security technique used to prevent attackers from making a computer program run in unintended ways. It works by ensuring that the order in which a program’s instructions are executed follows a pre-defined, legitimate path. This stops common attacks where malicious software tries to hijack the flow of a…

Secure Memory Encryption

Secure Memory Encryption is a technology used to protect data stored in a computer’s memory by automatically encrypting it. This means that if someone tries to access the memory without proper authorisation, the data appears as unreadable gibberish. The encryption and decryption happen in real time, so the system works as usual but with added…

Cache Timing Attacks

Cache timing attacks are a type of side-channel attack where an attacker tries to gain sensitive information by measuring how quickly data can be accessed from a computer’s memory cache. The attacker observes the time it takes for the system to perform certain operations and uses these measurements to infer secrets, such as cryptographic keys….

Microarchitectural Attacks

Microarchitectural attacks are security exploits that take advantage of the way computer processors work internally, rather than flaws in software or operating systems. These attacks manipulate how hardware components like caches, branch predictors, or execution pipelines behave to extract sensitive information. This can allow attackers to access data they should not be able to see,…

Spectre and Meltdown Mitigations

Spectre and Meltdown are security vulnerabilities found in many modern computer processors. They allow attackers to read sensitive data from a computer’s memory that should be protected. Mitigations are techniques and software updates designed to prevent these attacks, often by changing how processors handle certain tasks or by updating operating systems to block malicious behaviour.

Rowhammer Attacks

Rowhammer attacks are a type of cyberattack that target the physical memory chips in computers, especially DRAM. By rapidly and repeatedly accessing specific rows of memory, attackers can cause tiny electrical disturbances that flip bits in nearby rows. This can lead to unauthorised changes in data, potentially allowing attackers to bypass security measures or gain…