BranchScope
- 19 March 2018
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 693-707
- https://doi.org/10.1145/3173162.3173204
Abstract
No abstract availableKeywords
Funding Information
- Qatar National Research Fund (8-1474-2-626)
This publication has 35 references indexed in Scilit:
- TimeWarpACM SIGARCH Computer Architecture News, 2012
- Non-monopolizable cachesACM Transactions on Architecture and Code Optimization, 2012
- Feeling Secure vs. Being Secure the Mobile Phone User CaseLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012
- New cache designs for thwarting software cache-based side channel attacksACM SIGARCH Computer Architecture News, 2007
- Predicting Secret Keys Via Branch PredictionLecture Notes in Computer Science, 2006
- Remote timing attacks are practicalComputer Networks, 2005
- A Practical Implementation of the Timing AttackLecture Notes in Computer Science, 2000
- Trading conflict and capacity aliasing in conditional branch predictorsACM SIGARCH Computer Architecture News, 1997
- The agree predictorACM SIGARCH Computer Architecture News, 1997
- Using hybrid branch predictors to improve branch prediction accuracy in the presence of context switchesACM SIGARCH Computer Architecture News, 1996