summaryrefslogtreecommitdiff
path: root/thesis.bib
diff options
context:
space:
mode:
authorIru Cai <mytbk920423@gmail.com>2019-04-24 16:01:15 +0800
committerIru Cai <mytbk920423@gmail.com>2019-04-24 16:01:15 +0800
commit313b40908e4b751b746d993549217fa6352904e6 (patch)
tree9e01d52dd840c6b96f429db7719de63f621b3dae /thesis.bib
parentfb0e8ad0c8747b14ccfec5cb846e9bc6901f5725 (diff)
downloaddissertation-313b40908e4b751b746d993549217fa6352904e6.tar.xz
update
Diffstat (limited to 'thesis.bib')
-rw-r--r--thesis.bib19
1 files changed, 16 insertions, 3 deletions
diff --git a/thesis.bib b/thesis.bib
index cf53a59..a6fe84c 100644
--- a/thesis.bib
+++ b/thesis.bib
@@ -28,7 +28,7 @@
}
@inproceedings{spectre,
- author = {Paul Kocher and Jann Horn and Anders Fogh and and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom},
+ author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom},
title = {Spectre Attacks: Exploiting Speculative Execution},
booktitle = {40th IEEE Symposium on Security and Privacy (S\&P'19)},
year = {2019},
@@ -159,11 +159,11 @@
}
@online{spec-load-hardening,
- title={RFC: Speculative Load Hardening (a Spectre variant #1 mitigation)},
+ title={Speculative Load Hardening},
author={Chandler Carruth},
year={2018},
month={March},
- url={https://lists.llvm.org/pipermail/llvm-dev/2018-March/122085.html}
+ url={https://releases.llvm.org/8.0.0/docs/SpeculativeLoadHardening.html}
}
% looks like there's some useful references
@@ -338,6 +338,19 @@ This thesis highlights two aspects of the BOOM design: its industry-competitive
note = {\url{https://eprint.iacr.org/2018/808}},
}
+@INPROCEEDINGS{conditional-speculation,
+ author={P. {Li} and L. {Zhao} and R. {Hou} and L. {Zhang} and D. {Meng}},
+ booktitle={2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)},
+ title={Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks},
+ year={2019},
+ volume={},
+ number={},
+ pages={264-276},
+ keywords={cache storage;computer architecture;microprocessor chips;program diagnostics;security of data;trusted page buffer;cachehit based hazard filter;conditional speculation;spectre vulnerabilities;false security hazards;unsafe instructions;safe instructions;classic out-of-order pipeline;suspect speculation flags;security-dependent instructions;potential security risk;speculative memory instructions;security dependence;software transparent defense mechanism;security consideration;speculative execution;spectre attacks;out-of-order execution;Security;Hazards;Out of order;Microprocessors;Registers;Spectre vulnerabilities defense;Security dependence;Speculative execution side-channel vulnerabilities},
+ doi={10.1109/HPCA.2019.00043},
+ ISSN={2378-203X},
+ month={Feb},}
+
% looks useful...
@INPROCEEDINGS{poisonivy,
author={T. S. {Lehman} and A. D. {Hilton} and B. C. {Lee}},