Author:
Gras Ben,Razavi Kaveh,Bosman Erik,Bos Herbert,Giuffrida Cristiano
Cited by
110 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Breaking KASLR on mobile devices without any use of cache memory (extended version);Journal of Cryptographic Engineering;2024-01-05
2. Mex+Sync: Software Covert Channels Exploiting Mutual Exclusion and Synchronization;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-12
3. T
unne
L
s for
B
ootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. PANIC: PAN-assisted Intra-process Memory Isolation on ARM;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15