ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.12224
  4. Cited By
Leaky Frontends: Security Vulnerabilities in Processor Frontends

Leaky Frontends: Security Vulnerabilities in Processor Frontends

25 May 2021
Shuwen Deng
Bowen Huang
Jakub Szefer
ArXivPDFHTML

Papers citing "Leaky Frontends: Security Vulnerabilities in Processor Frontends"

12 / 12 papers shown
Title
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
55
0
0
05 Sep 2024
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring
  Interconnect Are Practical
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
Riccardo Paccagnella
Licheng Luo
Christopher W. Fletcher
41
103
0
05 Mar 2021
Leaking Information Through Cache LRU States
Leaking Information Through Cache LRU States
Wenjie Xiong
Jakub Szefer
35
69
0
20 May 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
59
419
0
14 May 2019
SMoTherSpectre: exploiting speculative execution through port contention
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
47
242
0
05 Mar 2019
Robust Website Fingerprinting Through the Cache Occupancy Channel
Robust Website Fingerprinting Through the Cache Occupancy Channel
A. Shusterman
Lachlan Kang
Yarden Haskal
Yosef Meltser
Prateek Mittal
Yossef Oren
Y. Yarom
MLAU
29
141
0
17 Nov 2018
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
47
404
0
13 Nov 2018
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
33
230
0
27 Jul 2018
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks
  Exploiting Invalidation-Based Coherence Protocols
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols
Caroline Trippel
Daniel Lustig
M. Martonosi
37
76
0
11 Feb 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
71
2,177
0
03 Jan 2018
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
67
577
0
14 Nov 2015
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
Yossef Oren
V. Kemerlis
S. Sethumadhavan
A. Keromytis
64
330
0
25 Feb 2015
1