Login / Signup
Two methods for exploiting speculative control flow hijacks.
Andrea Mambretti
Alexandra Sandulescu
Matthias Neugschwandtner
Alessandro Sorniotti
Anil Kurmus
Published in:
WOOT @ USENIX Security Symposium (2019)
Keyphrases
</>
control flow
significant improvement
databases
preprocessing
machine learning
learning algorithm
decision trees
case study
intelligent agents
data flow