ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.08348
  4. Cited By
Leaking Information Through Cache LRU States

Leaking Information Through Cache LRU States

20 May 2019
Wenjie Xiong
Jakub Szefer
ArXivPDFHTML

Papers citing "Leaking Information Through Cache LRU States"

8 / 8 papers shown
Title
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy
  Cache Attacks
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Samira Briongos
Pedro Malagón
Jose M. Moya
T. Eisenbarth
37
86
0
12 Apr 2019
SMoTherSpectre: exploiting speculative execution through port contention
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
47
242
0
05 Mar 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
47
404
0
13 Nov 2018
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
33
230
0
27 Jul 2018
ret2spec: Speculative Execution Using Return Stack Buffers
ret2spec: Speculative Execution Using Return Stack Buffers
G. Maisuradze
C. Rossow
SILM
38
255
0
26 Jul 2018
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free
  Speculation
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Khaled N. Khasawneh
Esmaeil Mohammadian Koruyeh
Chengyu Song
Dmitry Evtyushkin
D. Ponomarev
Nael B. Abu-Ghazaleh
46
183
0
13 Jun 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
71
2,177
0
03 Jan 2018
MemJam: A False Dependency Attack against Constant-Time Crypto
  Implementations
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations
A. Moghimi
T. Eisenbarth
B. Sunar
33
80
0
21 Nov 2017
1