Leakage contracts have recently been proposed as a new security abstract...
Attacks like Spectre abuse speculative execution, one of the key perform...
Modern processors employ different prediction mechanisms to speculate ov...
Spectre attacks enable an attacker to access restricted data in an
appli...
Non-interference is a popular way to enforce confidentiality of sensitiv...
Microarchitectural attacks exploit the abstraction gap between the
Instr...
Since the discovery of Spectre, a large number of hardware mechanisms fo...
Flushing the cache, using instructions like clflush and wbinvd, is commo...
We show how to infer deterministic cache replacement policies using
off-...
Speculative execution has been demonstrated to leak information about
ex...
Since the advent of SPECTRE, a number of countermeasures have been propo...
Databases can leak confidential information when users combine query res...