diff options
author | Iru Cai <mytbk920423@gmail.com> | 2019-04-24 16:01:15 +0800 |
---|---|---|
committer | Iru Cai <mytbk920423@gmail.com> | 2019-04-24 16:01:15 +0800 |
commit | 313b40908e4b751b746d993549217fa6352904e6 (patch) | |
tree | 9e01d52dd840c6b96f429db7719de63f621b3dae /thesis.bib | |
parent | fb0e8ad0c8747b14ccfec5cb846e9bc6901f5725 (diff) | |
download | dissertation-313b40908e4b751b746d993549217fa6352904e6.tar.xz |
update
Diffstat (limited to 'thesis.bib')
-rw-r--r-- | thesis.bib | 19 |
1 files changed, 16 insertions, 3 deletions
@@ -28,7 +28,7 @@ } @inproceedings{spectre, - author = {Paul Kocher and Jann Horn and Anders Fogh and and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, + author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, booktitle = {40th IEEE Symposium on Security and Privacy (S\&P'19)}, year = {2019}, @@ -159,11 +159,11 @@ } @online{spec-load-hardening, - title={RFC: Speculative Load Hardening (a Spectre variant #1 mitigation)}, + title={Speculative Load Hardening}, author={Chandler Carruth}, year={2018}, month={March}, - url={https://lists.llvm.org/pipermail/llvm-dev/2018-March/122085.html} + url={https://releases.llvm.org/8.0.0/docs/SpeculativeLoadHardening.html} } % looks like there's some useful references @@ -338,6 +338,19 @@ This thesis highlights two aspects of the BOOM design: its industry-competitive note = {\url{https://eprint.iacr.org/2018/808}}, } +@INPROCEEDINGS{conditional-speculation, + author={P. {Li} and L. {Zhao} and R. {Hou} and L. {Zhang} and D. {Meng}}, + booktitle={2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)}, + title={Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks}, + year={2019}, + volume={}, + number={}, + pages={264-276}, + keywords={cache storage;computer architecture;microprocessor chips;program diagnostics;security of data;trusted page buffer;cachehit based hazard filter;conditional speculation;spectre vulnerabilities;false security hazards;unsafe instructions;safe instructions;classic out-of-order pipeline;suspect speculation flags;security-dependent instructions;potential security risk;speculative memory instructions;security dependence;software transparent defense mechanism;security consideration;speculative execution;spectre attacks;out-of-order execution;Security;Hazards;Out of order;Microprocessors;Registers;Spectre vulnerabilities defense;Security dependence;Speculative execution side-channel vulnerabilities}, + doi={10.1109/HPCA.2019.00043}, + ISSN={2378-203X}, + month={Feb},} + % looks useful... @INPROCEEDINGS{poisonivy, author={T. S. {Lehman} and A. D. {Hilton} and B. C. {Lee}}, |