1. Control-flow integrity principles, implementations, and applications
2. Krste Asanović and David A. Patterson. 2014. Instruction Sets Should Be Free: The Case For RISC-V. (2014). https://people.eecs.berkeley.edu/~krste/papers/EECS-2014-146.pdf. Krste Asanović and David A. Patterson. 2014. Instruction Sets Should Be Free: The Case For RISC-V. (2014). https://people.eecs.berkeley.edu/~krste/papers/EECS-2014-146.pdf.
3. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels
4. Mohammad Behnia Prateek Sahu Riccardo Paccagnella Jiyong Yu Zirui Neil Zhao Xiang Zou Thomas Unterluggauer Josep Torrellas Carlos V. Rozas Adam Morrison Frank McKeen Fangfei Liu Ron Gabor Christopher W. Fletcher Abhishek Basak and Alaa R. Alameldeen. 2020. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. CoRR abs/2007.11818(2020). arxiv:2007.11818https://arxiv.org/abs/2007.11818 Mohammad Behnia Prateek Sahu Riccardo Paccagnella Jiyong Yu Zirui Neil Zhao Xiang Zou Thomas Unterluggauer Josep Torrellas Carlos V. Rozas Adam Morrison Frank McKeen Fangfei Liu Ron Gabor Christopher W. Fletcher Abhishek Basak and Alaa R. Alameldeen. 2020. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. CoRR abs/2007.11818(2020). arxiv:2007.11818https://arxiv.org/abs/2007.11818