Category: System Protection

Secure Deserialization

Secure deserialization is the process of safely converting data that has been stored or transmitted in a structured format back into an object or data structure. If not handled carefully, deserialization can be exploited by attackers to run malicious code, access sensitive information, or compromise a system. By applying security checks and using trusted sources,…

Control Flow Integrity

Control Flow Integrity, or CFI, is a security technique used to prevent attackers from making a computer program run in unintended ways. It works by ensuring that the order in which a program’s instructions are executed follows a pre-defined, legitimate path. This stops common attacks where malicious software tries to hijack the flow of a…

Secure Memory Encryption

Secure Memory Encryption is a technology used to protect data stored in a computer’s memory by automatically encrypting it. This means that if someone tries to access the memory without proper authorisation, the data appears as unreadable gibberish. The encryption and decryption happen in real time, so the system works as usual but with added…

Microarchitectural Attacks

Microarchitectural attacks are security exploits that take advantage of the way computer processors work internally, rather than flaws in software or operating systems. These attacks manipulate how hardware components like caches, branch predictors, or execution pipelines behave to extract sensitive information. This can allow attackers to access data they should not be able to see,…

Spectre and Meltdown Mitigations

Spectre and Meltdown are security vulnerabilities found in many modern computer processors. They allow attackers to read sensitive data from a computer’s memory that should be protected. Mitigations are techniques and software updates designed to prevent these attacks, often by changing how processors handle certain tasks or by updating operating systems to block malicious behaviour.