暂无分享,去创建一个
Tulika Mitra | Guanhua Wang | Abhik Roychoudhury | Sudipta Chattopadhyay | Ivan Gotovchits | T. Mitra | Guanhua Wang | Abhik Roychoudhury | Sudipta Chattopadhyay | Ivan Gotovchits
[1] John L. Henning. SPEC CPU2006 benchmark descriptions , 2006, CARN.
[2] Julian Stecklina,et al. LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels , 2018, ArXiv.
[3] Josep Torrellas,et al. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[4] Marco Guarnieri,et al. Spectector: Principled Detection of Speculative Information Flows , 2018, 2020 IEEE Symposium on Security and Privacy (SP).
[5] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[6] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[7] Srinivas Devadas,et al. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[8] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[9] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.
[10] Milind Girkar,et al. Comparative architectural characterization of SPEC CPU2000 and CPU2006 benchmarks on the intel® Core™ 2 Duo processor , 2008, 2008 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation.
[11] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[12] Fei Peng,et al. X-Force: Force-Executing Binary Programs for Security Applications , 2014, USENIX Security Symposium.
[13] Christof Fetzer,et al. You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass , 2018, ArXiv.
[14] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[15] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[16] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[17] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[18] A. Adam Ding,et al. SCADET: A Side-Channel Attack Detection Tool for Tracking Prime-Probe , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[19] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[20] Stefan Mangard,et al. KASLR is Dead: Long Live KASLR , 2017, ESSoS.
[21] Carl A. Waldspurger,et al. Speculative Buffer Overflows: Attacks and Defenses , 2018, ArXiv.
[22] Nael B. Abu-Ghazaleh,et al. Spectre Returns! Speculation Attacks Using the Return Stack Buffer , 2018, IEEE Design & Test.
[23] Thomas F. Wenisch,et al. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution , 2018 .
[24] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.