Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2501.12890
Cited By
Analyzing and Exploiting Branch Mispredictions in Microcode
22 January 2025
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Analyzing and Exploiting Branch Mispredictions in Microcode"
12 / 12 papers shown
Title
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
44
31
0
18 Jan 2023
Revizor: Testing Black-box CPUs against Speculation Contracts
O. Oleksenko
Christof Fetzer
Boris Köpf
M. Silberstein
121
40
0
14 May 2021
Fallout: Reading Kernel Writes From User Space
Marina Minkin
D. Moghimi
Moritz Lipp
Michael Schwarz
Jo Van Bulck
Daniel Genkin
Daniel Gruss
Frank Piessens
B. Sunar
Y. Yarom
111
66
0
29 May 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
82
422
0
14 May 2019
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics
Asanka P. Sayakkara
Nhien-An Le-Khac
Mark Scanlon
58
106
0
18 Mar 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
61
408
0
13 Nov 2018
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
SILM
AAML
46
190
0
20 Jul 2018
LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
Julian Stecklina
Thomas Prescher
38
119
0
19 Jun 2018
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
79
2,189
0
03 Jan 2018
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations
A. Moghimi
T. Eisenbarth
B. Sunar
48
80
0
21 Nov 2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
Xiaofeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
AAML
64
373
0
20 May 2017
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
56
456
0
27 Nov 2015
1