共 46 条
[32]
Jonas Eric., 2019, CoRR
[34]
Spectre Attacks: Exploiting Speculative Execution
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1-19
[35]
Lipp M, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P973
[36]
Liu GN, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P35
[37]
Lombardi F, 2015, ARTECH HSE INF SECUR, P1
[38]
Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud
[J].
2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021),
2021,
:1-13
[39]
Nam J, 2020, PROCEEDINGS OF THE 2020 USENIX ANNUAL TECHNICAL CONFERENCE, P81
[40]
Razavi K, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1