1. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, et al., Spectre attacks: exploiting speculative execution. Commun. ACM 63(7), pp. 93–101 (2020)
2. M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg, Meltdown: reading kernel memory from user space, in 27th USENIX Security Symposium (USENIX Security 18) (Baltimore, MD) (USENIX Association, Berkeley, 2018), pp. 973–990
3. J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci, F. Piessens, M. Silberstein, T.F. Wenisch, Y. Yarom, R. Strackx, Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution, in Proceedings of the 27th USENIX Security Symposium (USENIX Association, Berkeley, 2018)
4. G. Chen, S. Chen, Y. Xiao, Y. Zhang, Z. Lin, T.H. Lai, SgxPectre: stealing Intel secrets from SGX enclaves via speculative execution, in IEEE European Symposium on Security and Privacy (IEEE, New York, 2019), pp. 142–157
5. M. Schwarz, M. Lipp, D. Moghimi, J. Van Bulck, J. Stecklina, T. Prescher, D. Gruss, ZombieLoad: cross-privilege-boundary data sampling, in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2019), pp. 753–768