1. Acıiçmez, O., Seifert, J.P.: Cheap hardware parallelism implies cheap security. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 80–91. IEEE (2007)
2. AMD: Software Optimization Guide for AMD Family 15h Processors (2014).
https://www.amd.com/system/files/TechDocs/47414_15h_sw_opt_guide.pdf
3. Bhattacharyya, A., et al.: SMoTherSpectre: exploiting speculative execution through port contention. arXiv preprint
arXiv:1903.01843
(2019)
4. Cabrera Aldaya, A., Brumley, B.B., ul Hassan, S., Pereida García, C., Tuveri, N.: Port Contention for Fun and Profit. Cryptology ePrint Archive, Report 2018/1060 (2018).
https://eprint.iacr.org/2018/1060
5. Canella, C., et al.: A systematic evaluation of transient execution attacks and defenses. arXiv preprint
arXiv:1811.05441
(2018)