共 27 条
- [1] Barrett C., 2010, P 8 INT WORKSH SAT M, VVolume 13, P14
- [2] Efficient Information-Flow Verification Under Speculative Execution [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2019), 2019, 11781 : 499 - 514
- [3] Burch J. R., 1994, Computer Aided Verification. 6th International Conference, CAV '94. Proceedings, P68
- [4] Constant-Time Foundations for the New Spectre Era [J]. PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20), 2020, : 913 - 926
- [5] A Formal Approach to Secure Speculation [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 288 - 303
- [6] Z3: An efficient SMT solver [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 : 337 - 340
- [7] A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
- [8] InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1853 - 1869
- [9] SPECTECTOR: Principled Detection of Speculative Information Flows [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1 - 19
- [10] Hennessy J., 1982, MICRO 15. Proceedings of the 15th Annual Workshop on Microprogramming, P17