Login / Signup
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks.
Lutan Zhao
Peinan Li
Rui Hou
Michael C. Huang
Peng Liu
Lixin Zhang
Dan Meng
Published in:
IEEE Trans. Computers (2021)
Keyphrases
</>
security threats
security problems
security mechanisms
computer security
security measures
security protocols
cyber attacks
java card
security risks
security breaches
security vulnerabilities
denial of service attacks
security flaws
security issues
countermeasures
stream cipher
fault injection
chosen plaintext
malicious users
security requirements
information security
cryptographic algorithms
insider attacks
smart card
cryptographic protocols
security policies
network security
malicious attacks
key management
biometric template
buffer overflow
dos attacks
protection mechanisms
secure routing
statistical databases
access control
intrusion detection
identity theft
unauthorized access
denial of service
attack scenarios
security properties
security analysis
intrusion prevention
malicious nodes
security management
cyber security
defense mechanisms
sensitive data
intrusion detection and prevention
computer networks