ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2501.12890
  4. Cited By
Analyzing and Exploiting Branch Mispredictions in Microcode

Analyzing and Exploiting Branch Mispredictions in Microcode

22 January 2025
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
ArXiv (abs)PDFHTML

Papers citing "Analyzing and Exploiting Branch Mispredictions in Microcode"

12 / 12 papers shown
Title
Hide and Seek with Spectres: Efficient discovery of speculative
  information leaks with random testing
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
44
31
0
18 Jan 2023
Revizor: Testing Black-box CPUs against Speculation Contracts
Revizor: Testing Black-box CPUs against Speculation Contracts
O. Oleksenko
Christof Fetzer
Boris Köpf
M. Silberstein
121
40
0
14 May 2021
Fallout: Reading Kernel Writes From User Space
Fallout: Reading Kernel Writes From User Space
Marina Minkin
D. Moghimi
Moritz Lipp
Michael Schwarz
Jo Van Bulck
Daniel Genkin
Daniel Gruss
Frank Piessens
B. Sunar
Y. Yarom
111
66
0
29 May 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
82
422
0
14 May 2019
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their
  Case-Progressing Potential for Digital Forensics
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics
Asanka P. Sayakkara
Nhien-An Le-Khac
Mark Scanlon
58
106
0
18 Mar 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
61
408
0
13 Nov 2018
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
SILMAAML
46
190
0
20 Jul 2018
LazyFP: Leaking FPU Register State using Microarchitectural
  Side-Channels
LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
Julian Stecklina
Thomas Prescher
38
119
0
19 Jun 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
79
2,189
0
03 Jan 2018
MemJam: A False Dependency Attack against Constant-Time Crypto
  Implementations
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations
A. Moghimi
T. Eisenbarth
B. Sunar
48
80
0
21 Nov 2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
  Hazards in SGX
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
Xiaofeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
AAML
64
373
0
20 May 2017
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
56
456
0
27 Nov 2015
1