ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.03841
  4. Cited By
Hardware-Software Contracts for Secure Speculation

Hardware-Software Contracts for Secure Speculation

6 June 2020
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
ArXivPDFHTML

Papers citing "Hardware-Software Contracts for Secure Speculation"

33 / 33 papers shown
Title
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing
Jinyan Xu
Yangye Zhou
Xingzhi Zhang
You Li
Qinhan Tan
Yinqian Zhang
Yajin Zhou
Rui Chang
Wenbo Shen
27
0
0
29 Apr 2025
AMuLeT: Automated Design-Time Testing of Secure Speculation Countermeasures
Bo Fu
Leo Tenenbaum
David Adler
Assaf Klein
Arpit Gogia
Alaa R. Alameldeen
Marco Guarnieri
M. Silberstein
O. Oleksenko
Gururaj Saileshwar
27
0
0
28 Feb 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
42
0
0
05 Sep 2024
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through
  Targeted Instruction Hardening
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening
Yiming Zhu
Wenchao Huang
Yan Xiong
21
0
0
29 Aug 2024
SNIP: Speculative Execution and Non-Interference Preservation for
  Compiler Transformations
SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
Sören van der Wall
Roland Meyer
26
3
0
21 Jul 2024
SemPat: Using Hyperproperty-based Semantic Analysis to Generate
  Microarchitectural Attack Patterns
SemPat: Using Hyperproperty-based Semantic Analysis to Generate Microarchitectural Attack Patterns
Adwait Godbole
Yatin A. Manerkar
S. Seshia
37
1
0
08 Jun 2024
Testing side-channel security of cryptographic implementations against
  future microarchitectures
Testing side-channel security of cryptographic implementations against future microarchitectures
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
C. Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Y. Yarom
ELM
29
6
0
01 Feb 2024
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source
  Processors
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors
Gideon Mohr
Marco Guarnieri
Jan Reineke
23
3
0
17 Jan 2024
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and
  Performance Optimization
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Tiziano Marinaro
Pablo Buiras
Andreas Lindner
Roberto Guanciale
Hamed Nemati
30
0
0
15 Dec 2023
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge
  to Relax Speculative Execution Security Measures (Full Version)
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)
Rutvik Choudhary
Alan Wang
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
13
3
0
14 Dec 2023
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed
  Environments
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments
Philipp Schmitz
Tobias Jauch
Alex Wezel
M. R. Fadiheh
T. Tiemann
Jonah Heller
T. Eisenbarth
D. Stoffel
W. Kunz
27
0
0
13 Dec 2023
Robust Constant-Time Cryptography
Robust Constant-Time Cryptography
Matthew Kolosick
B. Shivakumar
Sunjay Cauligi
Marco Patrignani
Marco Vassena
Ranjit Jhala
D. Stefan
TTA
13
2
0
10 Nov 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
22
9
0
11 Sep 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
26
4
0
06 Sep 2023
Security Verification of Low-Trust Architectures
Security Verification of Low-Trust Architectures
Qinhan Tan
Yonathan Fisseha
Shibo Chen
Lauren Biernacki
Jean-Baptiste Jeannin
Sharad Malik
Todd Austin
18
2
0
01 Sep 2023
Mitigating Speculation-based Attacks through Configurable
  Hardware/Software Co-design
Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design
Ali Hajiabadi
Archit Agarwal
Andreas Diavastos
Trevor E. Carlson
44
1
0
20 Jun 2023
Formalizing, Verifying and Applying ISA Security Guarantees as Universal
  Contracts
Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts
Sander Huyghebaert
Steven Keuchel
Coen De Roover
Dominique Devriese
6
3
0
08 Jun 2023
Specification and Verification of Side-channel Security for Open-source
  Processors via Leakage Contracts
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts
Zilong Wang
Gideon Mohr
Klaus von Gleissenthall
Jan Reineke
Marco Guarnieri
19
23
0
11 May 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
  (Extended version)
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)
Lesly-Ann Daniel
Márton Bognár
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
12
9
0
23 Feb 2023
Hide and Seek with Spectres: Efficient discovery of speculative
  information leaks with random testing
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
8
29
0
18 Jan 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on
  Microarchitectural Optimizations
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
N. Holtryd
M. Manivannan
P. Stenström
AAML
33
2
0
20 Dec 2022
Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware
  Symbolic Execution
Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution
Ali Sahraee
21
0
0
24 Nov 2022
Short Paper: Static and Microarchitectural ML-Based Approaches For
  Detecting Spectre Vulnerabilities and Attacks
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
Chidera Biringa
Gaspard Baye
Gökhan Kul
13
1
0
26 Oct 2022
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory
  Sharing
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing
Dayeol Lee
Kevin Cheang
Alexander Thomas
Catherine Lu
Pranav Gaddamadugu
Anjo Vahldiek-Oberwagner
Mona Vij
D. Song
S. Seshia
Krste Asanović
FedML
18
9
0
30 Sep 2022
Automatic Detection of Speculative Execution Combinations
Automatic Detection of Speculative Execution Combinations
Xaver Fabian
Marco Guarnieri
Marco Patrignani
LRM
16
23
0
02 Sep 2022
A Turning Point for Verified Spectre Sandboxing
A Turning Point for Verified Spectre Sandboxing
Sunjay Cauligi
Marco Guarnieri
D. Moghimi
D. Stefan
Marco Vassena
7
3
0
02 Aug 2022
Relational Models of Microarchitectures for Formal Security Analyses
Relational Models of Microarchitectures for Formal Security Analyses
Nicholas Mosier
Hanna Lachnitt
Hamed Nemati
Caroline Trippel
18
1
0
20 Dec 2021
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative
  Execution Attacks
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
Hernán Ponce de León
Johannes Kinder
15
28
0
31 Aug 2021
Revizor: Testing Black-box CPUs against Speculation Contracts
Revizor: Testing Black-box CPUs against Speculation Contracts
O. Oleksenko
Christof Fetzer
Boris Köpf
M. Silberstein
17
38
0
14 May 2021
SoK: Practical Foundations for Software Spectre Defenses
SoK: Practical Foundations for Software Spectre Defenses
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
39
47
0
12 May 2021
Contract-Aware Secure Compilation
Contract-Aware Secure Compilation
Marco Guarnieri
Marco Patrignani
14
4
0
28 Dec 2020
Speculative Leakage in ARM Cortex-A53
Speculative Leakage in ARM Cortex-A53
Hamed Nemati
Roberto Guanciale
Pablo Buiras
Andreas Lindner
8
6
0
14 Jul 2020
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free
  Speculation
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Khaled N. Khasawneh
Esmaeil Mohammadian Koruyeh
Chengyu Song
Dmitry Evtyushkin
D. Ponomarev
Nael B. Abu-Ghazaleh
34
183
0
13 Jun 2018
1