Cited By
View all- Chakraborty AMishra NMukhopadhyay DBalzarotti DXu W(2024)SheshaProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698934(595-612)Online publication date: 14-Aug-2024
- Hofmann JVannacci EFournet CKöpf BOleksenko OCalandrino JTroncoso C(2023)Speculation at faultProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620637(7143-7160)Online publication date: 9-Aug-2023
- Schlüter TChoudhari AHetterich LTrampert LNemati HIbrahim ASchwarz MRossow CTippenhauer NMeng WJensen CCremers CKirda E(2023)FetchBench: Systematic Identification and Characterization of Proprietary PrefetchersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623124(975-989)Online publication date: 15-Nov-2023
- Show More Cited By