Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3352460.3361129acmconferencesArticle/Chapter ViewAbstractPublication PagesmicroConference Proceedingsconference-collections
abstract

InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy (Corrigendum)

Published: 12 October 2019 Publication History

Abstract

No abstract available.

References

[1]
M. Yan, J. Choi, D. Skarlatos, A. Morrison, C. Fletcher, and J. Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In MICRO'18.
[2]
M. Yan, J. Choi, D. Skarlatos, A. Morrison, C. Fletcher, and J. Torrellas. 2019. Correction: InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. Technical Report, University of Illinois at Urbana-Champaign, http://iacoma.cs.uiuc.edu/iacoma-papers/corrected_micro18.pdf.

Cited By

View all
  • (2024)Three Sidekicks to Support Spectre Countermeasures2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546575(1-6)Online publication date: 25-Mar-2024
  • (2024)Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data DependenciesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690201(3913-3927)Online publication date: 2-Dec-2024
  • (2024)Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637651(203-216)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MICRO '52: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture
October 2019
1104 pages
ISBN:9781450369381
DOI:10.1145/3352460
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2019

Check for updates

Qualifiers

  • Abstract
  • Research
  • Refereed limited

Funding Sources

Conference

MICRO '52
Sponsor:

Acceptance Rates

Overall Acceptance Rate 484 of 2,242 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)47
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Three Sidekicks to Support Spectre Countermeasures2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546575(1-6)Online publication date: 25-Mar-2024
  • (2024)Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data DependenciesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690201(3913-3927)Online publication date: 2-Dec-2024
  • (2024)Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637651(203-216)Online publication date: 1-Jul-2024
  • (2024)TEE-Time: A Dynamic Cache Timing Analysis Tool for Trusted Execution Environments2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528744(1-8)Online publication date: 3-Apr-2024
  • (2024)SecurityCloak: Protection against cache timing and speculative memory access attacksJournal of Systems Architecture10.1016/j.sysarc.2024.103107150(103107)Online publication date: May-2024
  • (2024)Secure Processor ArchitecturesHandbook of Computer Architecture10.1007/978-981-97-9314-3_10(171-199)Online publication date: 21-Dec-2024
  • (2023)Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks2023 Silicon Valley Cybersecurity Conference (SVCC)10.1109/SVCC56964.2023.10165527(1-8)Online publication date: 17-May-2023
  • (2023)DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00089(431-438)Online publication date: 21-Dec-2023
  • (2023)Automatic and Incremental Repair for Speculative Information LeaksVerification, Model Checking, and Abstract Interpretation10.1007/978-3-031-50521-8_14(291-313)Online publication date: 30-Dec-2023
  • (2023)Spectre and Meltdown Detection Using Explainable AIExplainable AI for Cybersecurity10.1007/978-3-031-46479-9_4(75-106)Online publication date: 28-Sep-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media