Defense against Micro-Architecture Level Transient Execution Based Attacks via Program Analysis

W Guanhua - 2020 - search.proquest.com
Modern processors rely on micro-architectural optimizations predicting or re-ordering the
instruction stream to improve performance. These optimizations may introduce security …

[图书][B] Identification and Mitigation of Information Leakage Caused by Side Channel Vulnerabilities in Network Stack

Y Cao - 2019 - search.proquest.com
Keeping users sensitive information secure and private in todays network is challenging.
Networks are large, complicated distributed systems and are subject to a wide variety of …