ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.01843
  4. Cited By
SMoTherSpectre: exploiting speculative execution through port contention

SMoTherSpectre: exploiting speculative execution through port contention

5 March 2019
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
ArXivPDFHTML

Papers citing "SMoTherSpectre: exploiting speculative execution through port contention"

27 / 27 papers shown
Title
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
MD Mahady Hassan
Shanto Roy
Reza Rahaeimehr
46
0
0
08 May 2025
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Taehun Kim
Hyerean Jang
Youngjoo Shin
52
0
0
13 Mar 2025
SMaCk: Efficient Instruction Cache Attacks via Self-Modifying Code Conflicts
SMaCk: Efficient Instruction Cache Attacks via Self-Modifying Code Conflicts
Seonghun Son
Daniel Moghimi
Berk Gulmezoglu
41
0
0
08 Feb 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
39
0
0
05 Sep 2024
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
26
4
0
06 Sep 2023
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation
  Contention Attacks
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Bowen Tang
Chenggang Wu
P. Yew
Yinqian Zhang
Mengyao Xie
Yuanming Lai
Yan Kang
Wen Wang
Qiang Wei
Zhe Wang
33
0
0
02 Feb 2023
Protecting Cache States Against Both Speculative Execution Attacks and
  Side-channel Attacks
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Guangyuan Hu
Ruby B. Lee
AAML
16
3
0
01 Feb 2023
SoK: Hardware Defenses Against Speculative Execution Attacks
SoK: Hardware Defenses Against Speculative Execution Attacks
Guangyuan Hu
Zecheng He
Ruby B. Lee
24
19
0
09 Jan 2023
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate
  Stealthy Fine-Grained Timers
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
Haocheng Xiao
S. Ainsworth
SyDa
29
14
0
26 Nov 2022
Systematic Analysis of Programming Languages and Their Execution
  Environments for Spectre Attacks
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Amir Naseredini
S. Gast
Martin Schwarzl
Pedro Miguel Sousa Bernardo
Amel Smajic
Claudio Canella
Martin Berger
Daniel Gruss
25
3
0
24 Nov 2021
Dynamic Process Isolation
Dynamic Process Isolation
Martin Schwarzl
Pietro Borrello
Andreas Kogler
Kenton Varda
T. Schuster
Daniel Gruss
Michael Schwarz
21
11
0
10 Oct 2021
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
Ofek Kirzner
Adam Morrison
13
35
0
29 Jun 2021
Evaluation of Cache Attacks on Arm Processors and Secure Caches
Evaluation of Cache Attacks on Arm Processors and Secure Caches
Shuwen Deng
Nikolay Matyunin
Wenjie Xiong
Stefan Katzenbeisser
Jakub Szefer
ELM
14
8
0
26 Jun 2021
SoK: Practical Foundations for Software Spectre Defenses
SoK: Practical Foundations for Software Spectre Defenses
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
39
47
0
12 May 2021
Abusing Cache Line Dirty States to Leak Information in Commercial
  Processors
Abusing Cache Line Dirty States to Leak Information in Commercial Processors
Yujie Cui
Chun Yang
Xu Cheng
31
15
0
17 Apr 2021
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring
  Interconnect Are Practical
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
Riccardo Paccagnella
Licheng Luo
Christopher W. Fletcher
13
103
0
05 Mar 2021
HyperDegrade: From GHz to MHz Effective CPU Frequencies
HyperDegrade: From GHz to MHz Effective CPU Frequencies
Alejandro Cabrera Aldaya
B. Brumley
32
12
0
04 Jan 2021
Speculative Interference Attacks: Breaking Invisible Speculation Schemes
Speculative Interference Attacks: Breaking Invisible Speculation Schemes
Mohammad R. Behnia
Prateek Sahu
Riccardo Paccagnella
Jiyong Yu
Zirui Neil Zhao
...
Fangfei Liu
Ron Gabor
Christopher W. Fletcher
A. Basak
Alaa R. Alameldeen
13
78
0
23 Jul 2020
Hardware-Software Contracts for Secure Speculation
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
6
89
0
06 Jun 2020
Survey of Transient Execution Attacks
Survey of Transient Execution Attacks
Wenjie Xiong
Jakub Szefer
SILM
49
25
0
27 May 2020
Automatically Eliminating Speculative Leaks from Cryptographic Code with
  Blade
Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade
Marco Vassena
Craig Disselkoen
K. V. Gleissenthall
Sunjay Cauligi
Rami Gökhan Kici
Ranjit Jhala
Dean Tullsen
D. Stefan
4
6
0
01 May 2020
SpectreRewind: Leaking Secrets to Past Instructions
SpectreRewind: Leaking Secrets to Past Instructions
Jacob Fustos
Michael Bechtel
H. Yun
32
6
0
27 Mar 2020
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
13
418
0
14 May 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
19
402
0
13 Nov 2018
Raziel: Private and Verifiable Smart Contracts on Blockchains
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
27
72
0
25 Jul 2018
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
SILM
AAML
24
184
0
20 Jul 2018
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free
  Speculation
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Khaled N. Khasawneh
Esmaeil Mohammadian Koruyeh
Chengyu Song
Dmitry Evtyushkin
D. Ponomarev
Nael B. Abu-Ghazaleh
34
183
0
13 Jun 2018
1