Clearing the Shadows (original) (raw)
Related papers
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2018
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
Cornell University - arXiv, 2018
SoK: Hardware Defenses Against Speculative Execution Attacks
2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Efficient invisible speculative execution through selective delay and value prediction
Proceedings of the 46th International Symposium on Computer Architecture
Understanding Selective Delay as a Method for Efficient Secure Speculative Execution
IEEE Transactions on Computers
Speculative execution for hiding memory latency
ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage
2020
Speculative memory cloaking and bypassing
1999
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), 2020
Isolating Speculative Data to Prevent Transient Execution Attacks
IEEE Computer Architecture Letters, 2019
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract
2020
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures
Proceedings of the 59th ACM/IEEE Design Automation Conference
LMP: Light-Weighted Memory Protection with Hardware Assistance
32nd Annual Conference on Computer Security Applications, 2016
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)
The Impact of Speculative Execution on SMT Processors
International Journal of Parallel Programming, 2007
GANDALF: A Fine-Grained Hardware–Software Co-Design for Preventing Memory Attacks
IEEE Embedded Systems Letters, 2018
Spectre Attacks: Exploiting Speculative Execution
DAGguise: mitigating memory timing side channels
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2022
Fast Track: Supporting Unsafe Optimizations with Software Speculation
16th International Conference on Parallel Architecture and Compilation Techniques (PACT 2007), 2007
ASIST: Architectural Support for Instruction Set Randomization
2015
Speculative interference attacks: breaking invisible speculation schemes
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks
ArXiv, 2021
AHEMS: Asynchronous Hardware-Enforced Memory Safety
2014 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the 8th ACM International Systems and Storage Conference, 2015
Exposing cache timing side-channel leaks through out-of-order symbolic execution
Proceedings of the ACM on Programming Languages, 2020
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021
SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels
2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT), 2019
Dynamic memory instruction bypassing
Proceedings of the 17th annual international conference on Supercomputing - ICS '03, 2003
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
Lecture Notes in Computer Science, 2013
Proving safety of speculative load instructions at compile-time
Lecture Notes in Computer Science, 1992