Clearing the Shadows (original) (raw)

DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors

Joel Emer

2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2018

View PDFchevron_right

Speculose: Analyzing the Security Implications of Speculative Execution in CPUs

Giorgi Maisuradze

Cornell University - arXiv, 2018

View PDFchevron_right

SoK: Hardware Defenses Against Speculative Execution Attacks

Ruby B. Lee

2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

View PDFchevron_right

Efficient invisible speculative execution through selective delay and value prediction

Magnus Själander

Proceedings of the 46th International Symposium on Computer Architecture

View PDFchevron_right

Understanding Selective Delay as a Method for Efficient Secure Speculative Execution

Alexandra Jimborean

IEEE Transactions on Computers

View PDFchevron_right

Speculative execution for hiding memory latency

Antonio Gonzalez

View PDFchevron_right

ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage

Pritam Majumder

2020

View PDFchevron_right

Speculative memory cloaking and bypassing

Andreas Moshovos

1999

View PDFchevron_right

Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution

Jiyong Yu

2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), 2020

View PDFchevron_right

Isolating Speculative Data to Prevent Transient Execution Attacks

Kristin Barber

IEEE Computer Architecture Letters, 2019

View PDFchevron_right

Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract

Anton Cao

2020

View PDFchevron_right

Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures

Anirban Chakraborty

Proceedings of the 59th ACM/IEEE Design Automation Conference

View PDFchevron_right

LMP: Light-Weighted Memory Protection with Hardware Assistance

Zhen Huang

32nd Annual Conference on Computer Security Applications, 2016

View PDFchevron_right

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks

Nelson Freitas

View PDFchevron_right

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Yanqi Zhou

2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)

View PDFchevron_right

The Impact of Speculative Execution on SMT Processors

Jean-luc Gaudiot

International Journal of Parallel Programming, 2007

View PDFchevron_right

GANDALF: A Fine-Grained Hardware–Software Co-Design for Preventing Memory Attacks

Kamakoti Veezhinathan

IEEE Embedded Systems Letters, 2018

View PDFchevron_right

Spectre Attacks: Exploiting Speculative Execution

Maverick Johnathan

View PDFchevron_right

DAGguise: mitigating memory timing side channels

Joel Emer

Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2022

View PDFchevron_right

Fast Track: Supporting Unsafe Optimizations with Software Speculation

chengliang zhang

16th International Conference on Parallel Architecture and Compilation Techniques (PACT 2007), 2007

View PDFchevron_right

ASIST: Architectural Support for Instruction Set Randomization

Laertis Loutsis

2015

View PDFchevron_right

Speculative interference attacks: breaking invisible speculation schemes

Ron Gabor

Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

View PDFchevron_right

Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses

Zeyu Mi

Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

View PDFchevron_right

Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks

Magnus Själander

ArXiv, 2021

View PDFchevron_right

AHEMS: Asynchronous Hardware-Enforced Memory Safety

Ravishankar Iyer

2014 17th Euromicro Conference on Digital System Design, 2014

View PDFchevron_right

Disruptive prefetching

Ruby B. Lee

Proceedings of the 8th ACM International Systems and Storage Conference, 2015

View PDFchevron_right

Exposing cache timing side-channel leaks through out-of-order symbolic execution

Jiyong Yu

Proceedings of the ACM on Programming Languages, 2020

View PDFchevron_right

Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy

Jiyong Yu

MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

View PDFchevron_right

SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels

Kristin Barber

2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT), 2019

View PDFchevron_right

Dynamic memory instruction bypassing

Daniel Ortega

Proceedings of the 17th annual international conference on Supercomputing - ICS '03, 2003

View PDFchevron_right

Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling

Pablo Buiras

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Proving safety of speculative load instructions at compile-time

David Bernstein

Lecture Notes in Computer Science, 1992

View PDFchevron_right