Cited By
View all- Van Bulck JMoghimi DSchwarz MLippi MMinkin MGenkin DYarom YSunar BGruss DPiessens F(2020)LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00089(54-72)Online publication date: May-2020
- Bender JPalsberg J(2019)A formalization of Java’s concurrent access modesProceedings of the ACM on Programming Languages10.1145/33605683:OOPSLA(1-28)Online publication date: 10-Oct-2019
- El-Hokayem AFalcone Y(2018)Can We Monitor All Multithreaded Programs?Runtime Verification10.1007/978-3-030-03769-7_6(64-89)Online publication date: 8-Nov-2018
- Show More Cited By