共 65 条
[1]
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[2]
Aciiçqmez O, 2008, LECT NOTES COMPUT SC, V4964, P256, DOI 10.1007/978-3-540-79263-5_16
[3]
Agarwal A, 2022, P IEEE S SECUR PRIV, P699, DOI [10.1109/SP46214.2022.00034, 10.1109/SP46214.2022.9833711]
[4]
MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State
[J].
2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020),
2020,
:132-144
[5]
[Anonymous], 2024, Ruby home page
[6]
Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
[7]
Briongos S., 2020, P USENIX SEC S
[8]
Brumley BB, 2009, LECT NOTES COMPUT SC, V5912, P667, DOI 10.1007/978-3-642-10366-7_39
[9]
SPEC CPU2017-Next-Generation Compute Benchmark
[J].
COMPANION OF THE 2018 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '18),
2018,
:41-42
[10]
SGXPECTRE: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
[J].
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2019,
:142-157