International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
ShadowLoad: Injecting State into Hardware Prefetchers
Financial Cryptography and Data Security (FC)
Do Compilers Break Constant-time Guarantees?
Network and Distributed System Security Symposium (NDSS)
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
Annual Computer Security Applications Conference (ACSAC)
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks
Usenix Security Symposium (USENIX-Security)
CacheWarp: Software-based Fault Injection using Selective State Reset
IEEE Symposium on Security and Privacy (S&P)
Efficient and Generic Microarchitectural Hash-Function Recovery
European Symposium on Research in Computer Security (ESORICS)
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
European Symposium on Research in Computer Security (ESORICS)
European Symposium on Research in Computer Security (ESORICS)
Usenix Security Symposium (USENIX-Security)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels