ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1812.08639
  4. Cited By
SPECTECTOR: Principled Detection of Speculative Information Flows

SPECTECTOR: Principled Detection of Speculative Information Flows

20 December 2018
Marco Guarnieri
Boris Köpf
J. Morales
Jan Reineke
Andrés Sánchez
ArXivPDFHTML

Papers citing "SPECTECTOR: Principled Detection of Speculative Information Flows"

13 / 13 papers shown
Title
Spectre is here to stay: An analysis of side-channels and speculative
  execution
Spectre is here to stay: An analysis of side-channels and speculative execution
R. McIlroy
J. Sevcík
Tobias Tebbi
Ben L. Titzer
T. Verwaest
30
121
0
14 Feb 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
37
403
0
13 Nov 2018
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
23
230
0
27 Jul 2018
ret2spec: Speculative Execution Using Return Stack Buffers
ret2spec: Speculative Execution Using Return Stack Buffers
G. Maisuradze
C. Rossow
SILM
27
254
0
26 Jul 2018
oo7: Low-overhead Defense against Spectre Attacks via Program Analysis
oo7: Low-overhead Defense against Spectre Attacks via Program Analysis
Guanhua Wang
Sudipta Chattopadhyay
Ivan Gotovchits
T. Mitra
Abhik Roychoudhury
46
98
0
16 Jul 2018
Speculative Buffer Overflows: Attacks and Defenses
Speculative Buffer Overflows: Attacks and Defenses
Vladimir Kiriansky
Carl A. Waldspurger
SILM
27
194
0
10 Jul 2018
LazyFP: Leaking FPU Register State using Microarchitectural
  Side-Channels
LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
Julian Stecklina
Thomas Prescher
28
118
0
19 Jun 2018
You Shall Not Bypass: Employing data dependencies to prevent Bounds
  Check Bypass
You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass
O. Oleksenko
Bohdan Trach
T. Reiher
M. Silberstein
Christof Fetzer
34
48
0
22 May 2018
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via
  Speculative Execution
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
Guoxing Chen
Sanchuan Chen
Yuan Xiao
Yinqian Zhang
Zhiqiang Lin
T. Lai
SILM
31
331
0
25 Feb 2018
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks
  Exploiting Invalidation-Based Coherence Protocols
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols
Caroline Trippel
Daniel Lustig
M. Martonosi
24
76
0
11 Feb 2018
Speculose: Analyzing the Security Implications of Speculative Execution
  in CPUs
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
G. Maisuradze
C. Rossow
46
24
0
12 Jan 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
46
2,171
0
03 Jan 2018
Rigorous Analysis of Software Countermeasures against Cache Attacks
Rigorous Analysis of Software Countermeasures against Cache Attacks
Goran Doychev
Boris Köpf
20
74
0
07 Mar 2016
1