ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.11818
  4. Cited By
Speculative Interference Attacks: Breaking Invisible Speculation Schemes

Speculative Interference Attacks: Breaking Invisible Speculation Schemes

23 July 2020
Mohammad R. Behnia
Prateek Sahu
Riccardo Paccagnella
Jiyong Yu
Zirui Neil Zhao
Xiang Zou
Thomas Unterluggauer
Josep Torrellas
Carlos V. Rozas
Adam Morrison
Francis X. McKeen
Fangfei Liu
Ron Gabor
Christopher W. Fletcher
A. Basak
Alaa R. Alameldeen
ArXivPDFHTML

Papers citing "Speculative Interference Attacks: Breaking Invisible Speculation Schemes"

11 / 11 papers shown
Title
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed
  Environments
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments
Philipp Schmitz
Tobias Jauch
Alex Wezel
M. R. Fadiheh
T. Tiemann
Jonah Heller
T. Eisenbarth
D. Stoffel
W. Kunz
27
0
0
13 Dec 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
26
4
0
06 Sep 2023
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation
  Contention Attacks
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Bowen Tang
Chenggang Wu
P. Yew
Yinqian Zhang
Mengyao Xie
Yuanming Lai
Yan Kang
Wen Wang
Qiang Wei
Zhe Wang
33
0
0
02 Feb 2023
Protecting Cache States Against Both Speculative Execution Attacks and
  Side-channel Attacks
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Guangyuan Hu
Ruby B. Lee
AAML
16
3
0
01 Feb 2023
SoK: Hardware Defenses Against Speculative Execution Attacks
SoK: Hardware Defenses Against Speculative Execution Attacks
Guangyuan Hu
Zecheng He
Ruby B. Lee
24
19
0
09 Jan 2023
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate
  Stealthy Fine-Grained Timers
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
Haocheng Xiao
S. Ainsworth
SyDa
32
14
0
26 Nov 2022
Relational Models of Microarchitectures for Formal Security Analyses
Relational Models of Microarchitectures for Formal Security Analyses
Nicholas Mosier
Hanna Lachnitt
Hamed Nemati
Caroline Trippel
16
1
0
20 Dec 2021
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Yanan Guo
Andrew Zigerelli
Youtao Zhang
Jun Yang
SILM
11
30
0
24 Oct 2021
"It's a Trap!"-How Speculation Invariance Can Be Abused with Forward
  Speculative Interference
"It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference
Pavlos Aimoniotis
Christos Sakalis
Magnus Själander
S. Kaxiras
38
2
0
22 Sep 2021
Hardware-Software Contracts for Secure Speculation
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
8
89
0
06 Jun 2020
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free
  Speculation
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Khaled N. Khasawneh
Esmaeil Mohammadian Koruyeh
Chengyu Song
Dmitry Evtyushkin
D. Ponomarev
Nael B. Abu-Ghazaleh
34
183
0
13 Jun 2018
1