Author:
Cheang Kevin,Rasmussen Cameron,Seshia Sanjit,Subramanyan Pramod
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. Serberus: Protecting Cryptographic Code from Spectres at Compile-Time;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Lifting Micro-Update Models from RTL for Formal Security Analysis;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
4. Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures;ACM Computing Surveys;2024-04-09
5. Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities;2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2024-03-02