Hema, L. K. and Kumar Dwibedi, Rajat and Regilan, S. and K., Dheenadhayalan and Vinay Kumar, Kommera and Satish Kumar, Survi (2024) Analysis of Cyber Attack on Processor Architecture Through Exploiting Vulnerabilities. Springer. pp. 189-204. ISSN 2327-0411
Full text not available from this repository.Abstract
A computer exploit exploits a system vulnerability to attack processor architectures including ARM, AMD, and Intel. The main CPU architectures nowadays are 32-bit (x86) and 64-bit (x86-64, IA64, and AMD64). Processor data route width, integer size, and memory address width vary per architecture. The chapter exploits processor architecture flaws. This study examines ARM and INTEL processor vulnerabilities. Modern processors like Intel, AMD, and ARM are vulnerable to Spectre. A malicious application can read data from an inaccessible area by breaking inter-process and intra-process isolation. Hardware and software protection prevents such access (for inter-process isolation). CPU architecture has a weakness that allows bypassing defences. The hardware fault makes it tough to rectify without replacing the CPUs. Spectre is a breed of CPU design vulnerability. Security education benefits from them and the Meltdown issue. In this chapter, the authors executed Spectre and Meltdown on ARM and INTEL processors to explore their vulnerabilities. The ARM processor was not vulnerable because the chip was patched, but the INTEL processor was vulnerable and retrieved the information. © 2024 Elsevier B.V., All rights reserved.
| Item Type: | Article |
|---|---|
| Subjects: | |
| Divisions: | Engineering and Technology > Aarupadai Veedu Institute of Technology, Chennai |
| Depositing User: | Unnamed user with email techsupport@mosys.org |
| Last Modified: | 27 Nov 2025 06:05 |
| URI: | https://vmuir.mosys.org/id/eprint/1557 |
Dimensions
Dimensions