ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2408.16220
  4. Cited By
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1

Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1

29 August 2024
Yiming Zhu
Wenchao Huang
Yan Xiong
ArXivPDFHTML

Papers citing "Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1"

26 / 26 papers shown
Title
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge
  to Relax Speculative Execution Security Measures (Full Version)
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)
Rutvik Choudhary
Alan Wang
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
123
3
0
14 Dec 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
35
9
0
11 Sep 2023
Hide and Seek with Spectres: Efficient discovery of speculative
  information leaks with random testing
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
32
31
0
18 Jan 2023
Automatic Detection of Speculative Execution Combinations
Automatic Detection of Speculative Execution Combinations
Xaver Fabian
Marco Guarnieri
Marco Patrignani
LRM
94
25
0
02 Sep 2022
Microwalk-CI: Practical Side-Channel Analysis for JavaScript
  Applications
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications
Jan Wichelmann
Florian Sieck
Anna Pätschke
T. Eisenbarth
40
22
0
31 Aug 2022
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Yanan Guo
Andrew Zigerelli
Youtao Zhang
Jun Yang
SILM
34
31
0
24 Oct 2021
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative
  Execution Attacks
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
Hernán Ponce de León
Johannes Kinder
42
28
0
31 Aug 2021
SoK: Practical Foundations for Software Spectre Defenses
SoK: Practical Foundations for Software Spectre Defenses
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
49
47
0
12 May 2021
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and
  Defenses in Cryptography
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography
Xiaoxuan Lou
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
49
91
0
26 Mar 2021
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
S. V. Schaik
Marina Minkin
Andrew Kwong
Daniel Genkin
Y. Yarom
38
140
0
23 Jun 2020
Hardware-Software Contracts for Secure Speculation
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
78
89
0
06 Jun 2020
Constant-Time Foundations for the New Spectre Era
Constant-Time Foundations for the New Spectre Era
Sunjay Cauligi
Craig Disselkoen
K. V. Gleissenthall
Dean Tullsen
D. Stefan
Tamara Rezk
Gilles Barthe
109
115
0
03 Oct 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract
  Interpretation
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
Shuai Wang
Yuyan Bao
Xiao Liu
Pei Wang
Qiang Yan
Dinghao Wu
38
53
0
30 May 2019
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
O. Oleksenko
Bohdan Trach
M. Silberstein
Christof Fetzer
35
83
0
24 May 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
64
419
0
14 May 2019
SMoTherSpectre: exploiting speculative execution through port contention
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
47
242
0
05 Mar 2019
SPECTECTOR: Principled Detection of Speculative Information Flows
SPECTECTOR: Principled Detection of Speculative Information Flows
Marco Guarnieri
Boris Köpf
J. Morales
Jan Reineke
Andrés Sánchez
93
158
0
20 Dec 2018
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
47
405
0
13 Nov 2018
ret2spec: Speculative Execution Using Return Stack Buffers
ret2spec: Speculative Execution Using Return Stack Buffers
G. Maisuradze
C. Rossow
SILM
38
255
0
26 Jul 2018
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
SILM
AAML
36
187
0
20 Jul 2018
oo7: Low-overhead Defense against Spectre Attacks via Program Analysis
oo7: Low-overhead Defense against Spectre Attacks via Program Analysis
Guanhua Wang
Sudipta Chattopadhyay
Ivan Gotovchits
T. Mitra
Abhik Roychoudhury
54
99
0
16 Jul 2018
Speculative Buffer Overflows: Attacks and Defenses
Speculative Buffer Overflows: Attacks and Defenses
Vladimir Kiriansky
Carl A. Waldspurger
SILM
38
194
0
10 Jul 2018
You Shall Not Bypass: Employing data dependencies to prevent Bounds
  Check Bypass
You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass
O. Oleksenko
Bohdan Trach
T. Reiher
M. Silberstein
Christof Fetzer
48
47
0
22 May 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
71
2,181
0
03 Jan 2018
Rigorous Analysis of Software Countermeasures against Cache Attacks
Rigorous Analysis of Software Countermeasures against Cache Attacks
Goran Doychev
Boris Köpf
28
75
0
07 Mar 2016
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
80
579
0
14 Nov 2015
1