1. Kocher P, Horn J, Fogh A, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T, Schwarz M, Yarom Y. Spectre attacks: Exploiting speculative execution. In Proc. the 2019 IEEE Symposium on Security and Privacy, May 2019, pp.1–19. DOI: 10.1109/SP.2019.00002.
2. Lipp M, Schwarz M, Gruss D, Prescher T, Haas W, Fogh A, Horn J, Mangard S, Kocher P, Genkin D, Yarom Y, Hamburg M. Meltdown: Reading kernel memory from user space. In Proc. the 27th USENIX Security Symposium, Aug. 2018, pp.973–990. DOI: 10.1145/3357033.
3. Bhattacharyya A, Sandulescu A, Neugschwandtner M, Sorniotti A, Falsafi B, Payer M, Kurmus A. SMoTHer- Spectre: Exploiting speculative execution through port contention. In Proc. the 2019 ACM SIGSAC Conference on Computer and Communications Security, Nov. 2019, pp.785–800. DOI: 10.1145/3319535.3363194.
4. Van Bulck J, Minkin M, Weisse O, Genkin D, Kasikci B, Piessens F, Silberstein M, Wenisch T F, Yarom Y, Strackx R. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In Proc. the 27th USENIX Security Symposium, Aug. 2018, pp.991–1008. DOI: 10.5555/3277203.3277277.
5. Chen G X, Chen S C, Xiao Y, Zhang Y Q, Lin Z Q, Lai T H. SgxPectre attacks: Stealing intel secrets from SGX enclaves via speculative execution. arXiv: 1802.09085, 2018. https://arxiv.org/abs/1802.09085, Dec. 2022.