ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2209.01179
  4. Cited By
Automatic Detection of Speculative Execution Combinations

Automatic Detection of Speculative Execution Combinations

Conference on Computer and Communications Security (CCS), 2022
2 September 2022
Xaver Fabian
Marco Guarnieri
Marco Patrignani
    LRM
ArXiv (abs)PDFHTML

Papers citing "Automatic Detection of Speculative Execution Combinations"

14 / 14 papers shown
A Distributed Emulation Environment for In-Memory Computing Systems
A Distributed Emulation Environment for In-Memory Computing SystemsInternational Instrumentation and Measurement Technology Conference (I2MTC), 2025
Eleni Bougioukou
Anastasios Petropoulos
Nikolaos Toulgaridis
Theodoros Chatzimichail
Theodore Antonakopoulos
65
0
0
09 Oct 2025
Detecting speculative data flow vulnerabilities using weakest precondition reasoning
Detecting speculative data flow vulnerabilities using weakest precondition reasoningTheoretical Aspects of Software Engineering (TASE), 2025
Graeme Smith
155
0
0
27 Apr 2025
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Yiming Zhu
Wenchao Huang
Yan Xiong
269
0
0
29 Aug 2024
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst
Henriette Herzog
Peter Wagemann
Maximilian Ott
Rüdiger Kapitza
Timo Honig
258
0
0
30 Apr 2024
Testing side-channel security of cryptographic implementations against
  future microarchitectures
Testing side-channel security of cryptographic implementations against future microarchitectures
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
C. Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Y. Yarom
ELM
136
11
0
01 Feb 2024
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source
  Processors
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source ProcessorsDesign, Automation and Test in Europe (DATE), 2024
Gideon Mohr
Marco Guarnieri
Jan Reineke
216
5
0
17 Jan 2024
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and
  Performance Optimization
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
Tiziano Marinaro
Pablo Buiras
Andreas Lindner
Roberto Guanciale
Hamed Nemati
162
0
0
15 Dec 2023
Robust Constant-Time Cryptography
Robust Constant-Time Cryptography
Matthew Kolosick
B. Shivakumar
Sunjay Cauligi
Marco Patrignani
Marco Vassena
Ranjit Jhala
D. Stefan
TTA
146
5
0
10 Nov 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-TimeIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
145
15
0
11 Sep 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
171
6
0
06 Sep 2023
Secure Composition of Robust and Optimising Compilers
Secure Composition of Robust and Optimising Compilers
Matthis Kruse
Michael Backes
Marco Patrignani
155
1
0
17 Jul 2023
Specification and Verification of Side-channel Security for Open-source
  Processors via Leakage Contracts
Specification and Verification of Side-channel Security for Open-source Processors via Leakage ContractsConference on Computer and Communications Security (CCS), 2023
Zilong Wang
Gideon Mohr
Klaus von Gleissenthall
Jan Reineke
Marco Guarnieri
166
31
0
11 May 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
  (Extended version)
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)USENIX Security Symposium (USENIX Security), 2023
Lesly-Ann Daniel
Márton Bognár
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
315
13
0
23 Feb 2023
Hide and Seek with Spectres: Efficient discovery of speculative
  information leaks with random testing
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testingIEEE Symposium on Security and Privacy (IEEE S&P), 2023
O. Oleksenko
Marco Guarnieri
Boris Köpf
M. Silberstein
145
40
0
18 Jan 2023
1
Page 1 of 1