Cited By
View all- Agredo CLangehaug TGraham S(2024)Inferring TLB Configuration with Performance ToolsJournal of Cybersecurity and Privacy10.3390/jcp40400444:4(951-971)Online publication date: 12-Nov-2024
- Jin YWang CQiu PLiu CYang YZheng HLyu YLi XQu GWang DDe V(2024)Whisper: Timing the Transient Execution to Leak Secrets and Break KASLRProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3656213(1-6)Online publication date: 23-Jun-2024
- Kim TRudo DZhao KZhao ZSkarlatos D(2024)Perspective: A Principled Framework for Pliable and Secure Speculation in Operating Systems2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA)10.1109/ISCA59077.2024.00059(739-755)Online publication date: 29-Jun-2024
- Show More Cited By