Login / Signup
Spectre Returns! Speculation Attacks Using the Return Stack Buffer.
Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
Published in:
IEEE Des. Test (2024)
Keyphrases
</>
buffer overflow
countermeasures
computer security
security mechanisms
security protocols
buffer size
denial of service attacks
malicious attacks
malicious users
dow jones
website
data corruption
terrorist attacks
traffic analysis
security threats
security problems
java card
watermarking technique