Smotherspectre: exploiting speculative execution through port contention A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 263 | 2019 |
Bypassing memory safety mechanisms through speculative control flow hijacks A Mambretti, A Sandulescu, A Sorniotti, W Robertson, E Kirda, A Kurmus 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 633-649, 2021 | 26 | 2021 |
Two methods for exploiting speculative control flow hijacks A Mambretti, A Sandulescu, M Neugschwandtner, A Sorniotti, A Kurmus 13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019 | 16 | 2019 |
Elastic program transformations: Automatically optimizing the reliability/performance trade-off in systems software JB Wagner EPFL, 2017 | 10 | 2017 |
Matthias Neugschwandt ner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, and Anil Kurmus. SMoTherSpectre: exploiting speculative execution through port contention A Bhattacharyya, A Sandulescu ACM Conference on Computer and Communications Security (CCS), 2019 | 8 | 2019 |
Smotherspectre A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 4 | 2019 |
GhostBuster: Understanding and overcoming the pitfalls of transient execution vulnerability checkers A Mambretti, P Convertini, A Sorniotti, A Sandulescu, E Kirda, A Kurmus 2021 IEEE International Conference on Software Analysis, Evolution and …, 2021 | 2 | 2021 |