On the Spectre and Meltdown Processor Security Vulnerabilities
暂无分享,去创建一个
Jon Masters | Mark D. Hill | John L. Hennessy | Parthasarathy Ranganathan | Paul Turner | J. Hennessy | M. Hill | Parthasarathy Ranganathan | Paul Turner | J. Masters
[1] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[2] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[3] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[4] Frank Piessens,et al. A Systematic Evaluation of Transient Execution Attacks and Defenses , 2018, USENIX Security Symposium.
[5] Akhilesh Kumar,et al. Cascade Lake: Next Generation Intel Xeon Scalable Processor , 2019, IEEE Micro.
[6] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[7] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.