Shared Resource Leakage

Prevent unauthorized and unintended information transfer via shared system resources. Ensure that processes reusing a shared system resource (e.g., registers, main memory, secondary storage) do not have access to information (including encrypted representations of information) previously stored in that resource during a prior use by a process after formal release of that resource back to the system or reuse

Best Segment for Countermeasure Deployment

  • Space Segment
ID: CM0040
Created: 2022/10/19
Last Modified: 2023/11/29