ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.10311
  4. Cited By
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
v1v2v3v4 (latest)

SpecFuzz: Bringing Spectre-type vulnerabilities to the surface

USENIX Security Symposium (USENIX Security), 2019
24 May 2019
O. Oleksenko
Bohdan Trach
M. Silberstein
Christof Fetzer
ArXiv (abs)PDFHTML

Papers citing "SpecFuzz: Bringing Spectre-type vulnerabilities to the surface"

22 / 22 papers shown
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing
Jinyan Xu
Yangye Zhou
Xingzhi Zhang
You Li
Qinhan Tan
Yinqian Zhang
Yajin Zhou
Rui Chang
Wenbo Shen
176
1
0
29 Apr 2025
Teapot: Efficiently Uncovering Spectre Gadgets in COTS BinariesIEEE/ACM International Symposium on Code Generation and Optimization (CGO), 2024
Fangzheng Lin
Zhongfa Wang
Hiroshi Sasaki
194
1
0
18 Nov 2024
Attacking Slicing Network via Side-channel Reinforcement Learning Attack
Attacking Slicing Network via Side-channel Reinforcement Learning Attack
Wei Shao
Chandra Thapa
Rayne Holland
Sarah Ali Siddiqui
S. Çamtepe
AAML
196
1
0
17 Sep 2024
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Yiming Zhu
Wenchao Huang
Yan Xiong
267
1
0
29 Aug 2024
Testing side-channel security of cryptographic implementations against
  future microarchitectures
Testing side-channel security of cryptographic implementations against future microarchitectures
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
C. Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Y. Yarom
ELM
132
11
0
01 Feb 2024
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and
  Performance Optimization
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
Tiziano Marinaro
Pablo Buiras
Andreas Lindner
Roberto Guanciale
Hamed Nemati
150
0
0
15 Dec 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-TimeIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
145
15
0
11 Sep 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
170
6
0
06 Sep 2023
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel
  Patching
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
M. Tol
B. Sunar
227
7
0
24 Aug 2023
Automatic and Incremental Repair for Speculative Information Leaks
Automatic and Incremental Repair for Speculative Information LeaksInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI), 2023
Joachim Bard
Swen Jacobs
Y. Vizel
146
1
0
17 May 2023
Short Paper: Static and Microarchitectural ML-Based Approaches For
  Detecting Spectre Vulnerabilities and Attacks
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
Chidera Biringa
Gaspard Baye
Gökhan Kul
207
4
0
26 Oct 2022
Synergia: Hardening High-Assurance Security Systems with Confidential
  and Trusted Computing
Synergia: Hardening High-Assurance Security Systems with Confidential and Trusted ComputingACM Symposium on Applied Computing (SAC), 2022
W. Ożga
Rasha Faqeh
D. Quoc
Franz Gregor
S. Dragone
Christof Fetzer
117
4
0
12 May 2022
Relational Models of Microarchitectures for Formal Security Analyses
Relational Models of Microarchitectures for Formal Security Analyses
Nicholas Mosier
Hanna Lachnitt
Hamed Nemati
Caroline Trippel
179
1
0
20 Dec 2021
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative
  Execution Attacks
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution AttacksIEEE Symposium on Security and Privacy (IEEE S&P), 2021
Hernán Ponce de León
Johannes Kinder
159
35
0
31 Aug 2021
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
An Analysis of Speculative Type Confusion Vulnerabilities in the WildUSENIX Security Symposium (USENIX Security), 2021
Ofek Kirzner
Adam Morrison
170
38
0
29 Jun 2021
Revizor: Testing Black-box CPUs against Speculation Contracts
Revizor: Testing Black-box CPUs against Speculation ContractsIEEE Micro (IEEE Micro), 2021
O. Oleksenko
Christof Fetzer
Boris Köpf
M. Silberstein
270
50
0
14 May 2021
SoK: Practical Foundations for Software Spectre Defenses
SoK: Practical Foundations for Software Spectre DefensesIEEE Symposium on Security and Privacy (IEEE S&P), 2021
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
165
56
0
12 May 2021
A practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemInternational Middleware Conference (Middleware), 2020
W. Ożga
D. Quoc
Christof Fetzer
165
9
0
05 Jan 2021
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using
  Neural Embeddings
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural EmbeddingsEuropean Symposium on Security and Privacy (EuroS&P), 2020
M. Caner Tol
Berk Gülmezoglu
Koray Yurtseven
B. Sunar
143
18
0
25 Jun 2020
Survey of Transient Execution Attacks
Survey of Transient Execution Attacks
Wenjie Xiong
Jakub Szefer
SILM
199
26
0
27 May 2020
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionInternational Conference on Software Engineering (ICSE), 2019
Shengjian Guo
Yueqi Chen
Peng Li
Yueqiang Cheng
Huibo Wang
Meng Wu
Zhiqiang Zuo
212
51
0
04 Nov 2019
KLEESPECTRE: Detecting Information Leakage through Speculative Cache
  Attacks via Symbolic Execution
KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic ExecutionACM Transactions on Software Engineering and Methodology (TOSEM), 2019
Guanhua Wang
Sudipta Chattopadhyay
A. Biswas
T. Mitra
Abhik Roychoudhury
111
23
0
02 Sep 2019
1