A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors | IEEE Conference Publication | IEEE Xplore