共 27 条
[1]
Barrett Clark, 2010, P 8 INT WORKSH SAT M, V13
[2]
Efficient Information-Flow Verification Under Speculative Execution
[J].
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2019),
2019, 11781
:499-514
[3]
Burch J. R., 1994, Computer Aided Verification. 6th International Conference, CAV '94. Proceedings, P68
[4]
Constant-Time Foundations for the New Spectre Era
[J].
PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20),
2020,
:913-926
[5]
A Formal Approach to Secure Speculation
[J].
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019),
2019,
:288-303
[6]
Z3: An efficient SMT solver
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS,
2008, 4963
:337-340
[7]
A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors
[J].
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2020,
[8]
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1853-1869
[9]
SPECTECTOR: Principled Detection of Speculative Information Flows
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1-19
[10]
Hennessy J., 1982, MICRO 15. Proceedings of the 15th Annual Workshop on Microprogramming, P17