Cited By
View all- Hertogh MWiebing SGiuffrida C(2024)Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00158(3773-3788)Online publication date: 19-May-2024
- Canpolat OYağlıkçı AOlgun AYuksel ITuğrul YKanellopoulos KErgin OMutlu O(2024)BreakHammer: Enhancing RowHammer Mitigations by Carefully Throttling Suspect Threads2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO)10.1109/MICRO61859.2024.00072(915-934)Online publication date: 2-Nov-2024
- Nam HBaek SWi MKim MPark JSong CKim NAhn J(2024)DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA)10.1109/ISCA59077.2024.00083(1097-1111)Online publication date: 29-Jun-2024
- Show More Cited By

