iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/151/7533.bib
@inproceedings{DBLP:conf/asplos/BehniaSPYZZUTR021, author = {Mohammad Behnia and Prateek Sahu and Riccardo Paccagnella and Jiyong Yu and Zirui Neil Zhao and Xiang Zou and Thomas Unterluggauer and Josep Torrellas and Carlos V. Rozas and Adam Morrison and Frank McKeen and Fangfei Liu and Ron Gabor and Christopher W. Fletcher and Abhishek Basak and Alaa R. Alameldeen}, editor = {Tim Sherwood and Emery D. Berger and Christos Kozyrakis}, title = {Speculative interference attacks: breaking invisible speculation schemes}, booktitle = {{ASPLOS} '21: 26th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Virtual Event, USA, April 19-23, 2021}, pages = {1046--1060}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445814.3446708}, doi = {10.1145/3445814.3446708}, timestamp = {Sat, 30 Sep 2023 09:34:47 +0200}, biburl = {https://dblp.org/rec/conf/asplos/BehniaSPYZZUTR021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2007-11818, author = {Mohammad Behnia and Prateek Sahu and Riccardo Paccagnella and Jiyong Yu and Zirui Neil Zhao and Xiang Zou and Thomas Unterluggauer and Josep Torrellas and Carlos V. Rozas and Adam Morrison and Frank McKeen and Fangfei Liu and Ron Gabor and Christopher W. Fletcher and Abhishek Basak and Alaa R. Alameldeen}, title = {Speculative Interference Attacks: Breaking Invisible Speculation Schemes}, journal = {CoRR}, volume = {abs/2007.11818}, year = {2020}, url = {https://arxiv.org/abs/2007.11818}, eprinttype = {arXiv}, eprint = {2007.11818}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-11818.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isca/ChakrabartiLVMR17, author = {Somnath Chakrabarti and Rebekah Leslie{-}Hurd and Mona Vij and Frank McKeen and Carlos V. Rozas and Dror Caspi and Ilya Alexandrovich and Ittai Anati}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Architecture for Oversubscription of Secure Memory in a Virtualized Environment}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092634}, doi = {10.1145/3092627.3092634}, timestamp = {Tue, 06 Nov 2018 11:07:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ChakrabartiLVMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/hpca/LiuGYMRHL16, author = {Fangfei Liu and Qian Ge and Yuval Yarom and Frank McKeen and Carlos V. Rozas and Gernot Heiser and Ruby B. Lee}, title = {CATalyst: Defeating last-level cache side channel attacks in cloud computing}, booktitle = {2016 {IEEE} International Symposium on High Performance Computer Architecture, {HPCA} 2016, Barcelona, Spain, March 12-16, 2016}, pages = {406--418}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCA.2016.7446082}, doi = {10.1109/HPCA.2016.7446082}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/LiuGYMRHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isca/McKeenAACJLR16, author = {Frank McKeen and Ilya Alexandrovich and Ittai Anati and Dror Caspi and Simon Johnson and Rebekah Leslie{-}Hurd and Carlos V. Rozas}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Support for Dynamic Memory Management Inside an Enclave}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {10:1--10:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2954331}, doi = {10.1145/2948618.2954331}, timestamp = {Tue, 06 Nov 2018 11:07:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/McKeenAACJLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isca/McKeenABRSSS13, author = {Frank McKeen and Ilya Alexandrovich and Alex Berenzon and Carlos V. Rozas and Hisham Shafi and Vedvyas Shanbhogue and Uday R. Savagaonkar}, editor = {Ruby B. Lee and Weidong Shi}, title = {Innovative instructions and software model for isolated execution}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2488368}, doi = {10.1145/2487726.2488368}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/McKeenABRSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }