Specularizer : Detecting Speculative Execution Attacks via Performance Tracing
Open Access
- 9 July 2021
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- SpecuSymPublished by Association for Computing Machinery (ACM) ,2020
- Spectector: Principled Detection of Speculative Information FlowsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2020
- MI6Published by Association for Computing Machinery (ACM) ,2019
- SpecShield: Shielding Speculative Data from Microarchitectural Covert ChannelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- SpectreGuardPublished by Association for Computing Machinery (ACM) ,2019
- SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative ExecutionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit DetectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- Quantitative Evaluation of Intel PEBS Overhead for Online System-Noise AnalysisPublished by Association for Computing Machinery (ACM) ,2017
- GRIFFINPublished by Association for Computing Machinery (ACM) ,2017
- PT-CFIPublished by Association for Computing Machinery (ACM) ,2017