Cited By
View all- Hajiabadi AAgarwal ADiavastos ACarlson TDe V(2024)Levioso: Efficient Compiler-Informed Secure SpeculationProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3655894(1-6)Online publication date: 23-Jun-2024
- Yu FTang ZLi XFan Z(2024)LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution AttacksProceedings of the 21st ACM International Conference on Computing Frontiers10.1145/3649153.3649202(276-284)Online publication date: 7-May-2024
- Yan MBourgeat TMalik S(2024)Formal Verification for Secure Processors: A Guide for Computer ArchitectsComputer10.1109/MC.2024.343484857:10(138-143)Online publication date: 1-Oct-2024
- Show More Cited By