Cited By
View all- Tan QYang YBourgeat TMalik SYan MEeckhout LSmaragdakis GLiang KSampson AKim MRossbach C(2025)RTL Verification for Secure Speculation Using Contract Shadow LogicProceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3669940.3707243(970-986)Online publication date: 3-Feb-2025
- Gruss D(2025)MeltdownEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1688(1516-1520)Online publication date: 8-Jan-2025
- Zhang RGerlach LWeber DHetterich LLü YKogler ASchwarz MBalzarotti DXu W(2024)CacheWarpProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698964(1135-1151)Online publication date: 14-Aug-2024
- Show More Cited By