Login / Signup

A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors.

Mohammad Rahmani FadihehJohannes MüllerRaik BrinkmannSubhasish MitraDominik StoffelWolfgang Kunz
Published in: DAC (2020)
Keyphrases
  • countermeasures
  • steady state
  • information security
  • parallel processing
  • formal model