共 13 条
[1]
Constant-Time Foundations for the New Spectre Era
[J].
PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20),
2020,
:913-926
[2]
A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors
[J].
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2020,
[3]
MFence: Defending Against Memory Access Interference in a Disaggregated Cloud Memory Platform
[J].
38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023,
2023,
:1309-1317
[4]
An Open Source FPGA-Optimized Out-of-Order RISC-V Soft Processor
[J].
2019 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2019),
2019,
:63-71
[5]
FPTree: A Hybrid SCM-DRAM Persistent and Concurrent B-Tree for Storage Class Memory
[J].
SIGMOD'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2016,
:371-386
[8]
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
[J].
2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021),
2021,
[9]
Hardware Trojan Design and Detection in Asynchronous NCL Circuits
[J].
2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS),
2020,
[10]
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets
[J].
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021),
2021,