Efficient invisible speculative execution through selective delay and value prediction
- 22 June 2019
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 46th International Symposium on Computer Architecture
- p. 723-735
- https://doi.org/10.1145/3307650.3322216
Abstract
No abstract availableKeywords
Funding Information
- Vetenskapsra?det (2015-05159)
This publication has 36 references indexed in Scilit:
- Disruptive prefetchingPublished by Association for Computing Machinery (ACM) ,2015
- Last-Level Cache Side-Channel Attacks are PracticalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Security testing of a secure cache designPublished by Association for Computing Machinery (ACM) ,2013
- Non-monopolizable cachesACM Transactions on Architecture and Code Optimization, 2012
- The gem5 simulatorACM SIGARCH Computer Architecture News, 2011
- Non deterministic caches: a simple and effective defense against side channel attacksDesign Automation for Embedded Systems, 2008
- CAVAACM Transactions on Architecture and Code Optimization, 2006
- Cache-Collision Timing Attacks Against AESLecture Notes in Computer Science, 2006
- Cache Attacks and Countermeasures: The Case of AESLecture Notes in Computer Science, 2006
- HIDEPublished by Association for Computing Machinery (ACM) ,2004