Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1811.05441
Cited By
v1
v2
v3 (latest)
A Systematic Evaluation of Transient Execution Attacks and Defenses
13 November 2018
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"A Systematic Evaluation of Transient Execution Attacks and Defenses"
50 / 105 papers shown
Title
Exploiting Inaccurate Branch History in Side-Channel Attacks
Yuhui Zhu
Alessandro Biondi
15
0
0
08 Jun 2025
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
MD Mahady Hassan
Shanto Roy
Reza Rahaeimehr
67
0
0
08 May 2025
Detecting speculative data flow vulnerabilities using weakest precondition reasoning
Graeme Smith
54
0
0
27 Apr 2025
Reverse Engineering the Apple M1 Conditional Branch Predictor for Out-of-Place Spectre Mistraining
Adam Tuby
Adam Morrison
93
0
0
15 Feb 2025
SMaCk: Efficient Instruction Cache Attacks via Self-Modifying Code Conflicts
Seonghun Son
Daniel Moghimi
Berk Gulmezoglu
82
0
0
08 Feb 2025
Analyzing and Exploiting Branch Mispredictions in Microcode
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
73
0
0
22 Jan 2025
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization
Congcong Chen
Jinhua Cui
Gang Qu
Jiliang Zhang
SyDa
120
0
0
17 Jan 2025
SoK: Software Compartmentalization
Hugo Lefeuvre
Nathan Dautenhahn
David Chisnall
Pierre Olivier
63
4
0
11 Oct 2024
A Scheduling-Aware Defense Against Prefetching-Based Side-Channel Attacks
Till Schlüter
N. Tippenhauer
SILM
108
0
0
01 Oct 2024
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
79
0
0
05 Sep 2024
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Yiming Zhu
Wenchao Huang
Yan Xiong
53
0
0
29 Aug 2024
SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
Sören van der Wall
Roland Meyer
53
4
0
21 Jul 2024
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
Anirban Chakraborty
Nimish Mishra
Debdeep Mukhopadhyay
114
2
0
10 Jun 2024
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst
Henriette Herzog
Peter Wagemann
Maximilian Ott
Rüdiger Kapitza
Timo Honig
68
1
0
30 Apr 2024
Securing Monolithic Kernels using Compartmentalization
S. Lim
Sidhartha Agrawal
Xueyuan Han
David Eyers
Dan O'Keeffe
Thomas Pasquier
120
1
0
12 Apr 2024
Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters
Stefano Carnà
Serena Ferracci
Francesco Quaglia
Alessandro Pellegrini
65
13
0
18 Feb 2024
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments
Philipp Schmitz
Tobias Jauch
Alex Wezel
M. R. Fadiheh
T. Tiemann
Jonah Heller
T. Eisenbarth
D. Stoffel
W. Kunz
49
0
0
13 Dec 2023
Robust Constant-Time Cryptography
Matthew Kolosick
B. Shivakumar
Sunjay Cauligi
Marco Patrignani
Marco Vassena
Ranjit Jhala
D. Stefan
TTA
45
2
0
10 Nov 2023
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
Antoine Geimer
Mathéo Vergnolle
Frédéric Recoules
Lesly-Ann Daniel
Sébastien Bardin
Clémentine Maurice
70
18
0
12 Oct 2023
Reviving Meltdown 3a
Daniel Weber
Fabian Thomas
Lukas Gerlach
Ruiyi Zhang
Michael Schwarz
45
2
0
06 Oct 2023
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Daniel Weber
Fabian Thomas
Lukas Gerlach
Ruiyi Zhang
Michael Schwarz
101
0
0
06 Oct 2023
Random and Safe Cache Architecture to Defeat Cache Timing Attacks
Chumki Basu
Sezai Sablak
AAML
49
0
0
28 Sep 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
47
9
0
11 Sep 2023
Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era
Weon Taek Na
J. Emer
Mengjia Yan
45
1
0
08 Sep 2023
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)
Toby C. Murray
Mukesh Tiwari
G. Ernst
David A. Naumann
105
0
0
07 Sep 2023
This is How You Lose the Transient Execution War
Allison Randal
51
5
0
06 Sep 2023
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
M. Tol
B. Sunar
89
5
0
24 Aug 2023
Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design
Ali Hajiabadi
Archit Agarwal
Andreas Diavastos
Trevor E. Carlson
71
1
0
20 Jun 2023
SafeBet: Secure, Simple, and Fast Speculative Execution
Conor Green
Cole Nelson
Mithuna Thottethodi
T. N. Vijaykumar
102
3
0
13 Jun 2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)
Dhiman Chakraborty
Michael Schwarz
Sven Bugiel
126
0
0
06 Jun 2023
Automatic and Incremental Repair for Speculative Information Leaks
Joachim Bard
Swen Jacobs
Y. Vizel
66
1
0
17 May 2023
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs
Yu Jin
Pengfei Qiu
Chunlu Wang
Yihao Yang
Dongsheng Wang
Gang Qu
45
1
0
21 Apr 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)
Lesly-Ann Daniel
Márton Bognár
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
124
9
0
23 Feb 2023
Comprehensive Evaluation of RSB and Spectre Vulnerability on Modern Processors
Farhad Taheri
Siavash Bayat Sarmadi
A. Sadeghpour
Seyed Parsa Tayefeh Morsal
102
3
0
19 Feb 2023
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Bowen Tang
Chenggang Wu
P. Yew
Yinqian Zhang
Mengyao Xie
Yuanming Lai
Yan Kang
Wen Wang
Qiang Wei
Zhe Wang
57
0
0
02 Feb 2023
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Guangyuan Hu
Ruby B. Lee
AAML
41
3
0
01 Feb 2023
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
61
31
0
18 Jan 2023
SoK: Hardware Defenses Against Speculative Execution Attacks
Guangyuan Hu
Zecheng He
Ruby B. Lee
58
19
0
09 Jan 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
N. Holtryd
M. Manivannan
P. Stenström
AAML
63
2
0
20 Dec 2022
Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution
Ali Sahraee
51
0
0
24 Nov 2022
Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel CPUs
Jan Philipp Thoma
Tim Güneysu
56
12
0
05 Sep 2022
Automatic Detection of Speculative Execution Combinations
Xaver Fabian
Marco Guarnieri
Marco Patrignani
LRM
107
25
0
02 Sep 2022
Survey on Architectural Attacks: A Unified Classification and Attack Model
Tara Ghasempouri
J. Raik
C. Reinbrecht
Said Hamdioui
M. Taouil
AAML
119
7
0
30 Aug 2022
A Turning Point for Verified Spectre Sandboxing
Sunjay Cauligi
Marco Guarnieri
D. Moghimi
D. Stefan
Marco Vassena
45
3
0
02 Aug 2022
Software Mitigation of RISC-V Spectre Attacks
Ruxandra Bualucea
Paul Irofti
122
3
0
09 Jun 2022
MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption
Debopriya Roy Dipta
Berk Gülmezoglu
60
4
0
31 May 2022
You Cannot Always Win the Race: Analyzing the LFENCE/JMP Mitigation for Branch Target Injection
Alyssa Milburn
Ke Sun
Henrique Kawakami
114
12
0
08 Mar 2022
CVA6's Data cache: Structure and Behavior
Valentin Martinoli
Yannick Teglia
Abdellah Bouagoun
R. Leveugle
86
5
0
08 Feb 2022
A Comprehensive and Cross-Platform Test Suite for Memory Safety -- Towards an Open Framework for Testing Processor Hardware Supported Security Extensions
Wei Song
Jiameng Ying
Sihao Shen
Boya Li
Haodi Ma
Peng Liu
ELM
124
0
0
28 Nov 2021
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Amir Naseredini
S. Gast
Martin Schwarzl
Pedro Miguel Sousa Bernardo
Amel Smajic
Claudio Canella
Martin Berger
Daniel Gruss
48
3
0
24 Nov 2021
1
2
3
Next