Spectre declassified: Reading from the right place at the wrong time
Practical information-flow programming languages commonly allow controlled leakage via a
declassify construct—programmers can use this construct to declare intentional leakage. For …
declassify construct—programmers can use this construct to declare intentional leakage. For …
Side-channeling the Kalyna key expansion
In 2015, the block cipher Kalyna has been approved as the new encryption standard of
Ukraine. The cipher is a substitution-permutation network, whose design is based on AES …
Ukraine. The cipher is a substitution-permutation network, whose design is based on AES …
Secure instruction and data-level information flow tracking model for RISC-V
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration
in the supply chain of the semiconductor industry and untrusted actors/fields have raised …
in the supply chain of the semiconductor industry and untrusted actors/fields have raised …
Comprehensive evaluation of rsb and spectre vulnerability on modern processors
Performance-enhancing mechanisms such as branch prediction, out-of-order execution, and
return stack buffer (RSB) have been widely employed in today's modern processing units …
return stack buffer (RSB) have been widely employed in today's modern processing units …
[PDF][PDF] Spectre Declassified: Reading from the Right Place at the Wrong Time
B Ammanaghatta Shivakumar, J Barnes, G Barthe… - 2023 - repository.ubn.ru.nl
Practical information-flow programming languages commonly allow controlled leakage via a
declassify construct—programmers can use this construct to declare intentional leakage. For …
declassify construct—programmers can use this construct to declare intentional leakage. For …