Notice
This item has not yet been validated by imec staff.
Notice
This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/38178.2
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
dc.contributor.author | Van Bulck, Jo | |
dc.contributor.author | Moghimi, Daniel | |
dc.contributor.author | Schwarz, Michael | |
dc.contributor.author | Lipp, Moritz | |
dc.contributor.author | Minkin, Marina | |
dc.contributor.author | Genkin, Daniel | |
dc.contributor.author | Yarom, Yuval | |
dc.contributor.author | Sunar, Berk | |
dc.contributor.author | Gruss, Daniel | |
dc.contributor.author | Piessens, Frank | |
dc.date.accessioned | 2021-11-02T16:05:00Z | |
dc.date.available | 2021-11-02T16:05:00Z | |
dc.date.issued | 2020 | |
dc.identifier.issn | 1081-6011 | |
dc.identifier.other | WOS:000618063500004 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/38178 | |
dc.source | WOS | |
dc.title | LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection | |
dc.type | Proceedings paper | |
dc.contributor.orcidext | Van Bulck, Jo::0000-0002-5953-9196 | |
dc.identifier.doi | 10.1109/SP40000.2020.00089 | |
dc.identifier.eisbn | 978-1-7281-3497-0 | |
dc.source.numberofpages | 19 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 54 | |
dc.source.endpage | 72 | |
dc.source.conference | 41st IEEE Symposium on Security and Privacy (SP) | |
dc.source.conferencedate | MAY 18-21, 2020 | |
imec.availability | Under review |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |