G Barthe, M Böhme, S Cauligi… - arXiv preprint arXiv …, 2024 - arxiv.org
How will future microarchitectures impact the security of existing cryptographic implementations? As we cannot keep reducing the size of transistors, chip vendors have …
G Mohr, M Guarnieri, J Reineke - 2024 Design, Automation & …, 2024 - ieeexplore.ieee.org
Microarchitectural attacks compromise security by exploiting software-visible artifacts of microarchitectural optimizations such as caches and speculative execution. Defending …
Transient execution attacks have been one of the widely explored microarchitectural side channels since the discovery of Spectre and Meltdown. However, much of the research has …
Software security research has begun to formalize attacks and defenses against commonly deployed software, even the most optimized cryptography [38]. Newer programming …