Show simple item record

dc.contributor.authorChakraborty, Anirban
dc.contributor.authorSingh, Nikhilesh
dc.contributor.authorBhattacharya, Sarani
dc.contributor.authorRebeiro, Chester
dc.contributor.authorMukhopadhyay, Debdeep
dc.date.accessioned2023-11-17T08:48:32Z
dc.date.available2023-09-07T17:31:17Z
dc.date.available2023-11-17T08:48:32Z
dc.date.issued2022
dc.identifier.issnna
dc.identifier.otherWOS:001041471300093
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/42484.2
dc.sourceWOS
dc.titleTimed Speculative Attacks exploiting Store-to-Load Forwarding bypassing Cache-based Countermeasures
dc.typeProceedings paper
dc.contributor.imecauthorBhattacharya, Sarani
dc.identifier.doi10.1145/3489517.3530493
dc.identifier.eisbn978-1-4503-9142-9
dc.source.numberofpages6
dc.source.peerreviewyes
dc.source.beginpage553
dc.source.endpage558
dc.source.conference59th ACM/IEEE Design Automation Conference (DAC) - From Chips to Systems - Learn Today, Create Tomorrow
dc.source.conferencedateJUL 10-14, 2022
dc.source.conferencelocationSan Francisco
dc.source.journalna
imec.availabilityPublished - imec
dc.description.wosFundingTextThe authors would like to thank Department of Science and Technology (DST), India for partially funding the work under the "Swarnajayanti Fellowship" program and the project on hardware and automotive security, funded by National Mission on Interdisciplinary Cyber Physical Systems, DST and Defence Research Development Organisation, India for supporting publication under the project "Secure Resource-constrained Communication Framework for Tactical Networks using PUFs".


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version