Cited By
View all- Gast SJuffinger JMaar LRoyer CKogler AGruss D(2025)Remote Scheduler Contention AttacksFinancial Cryptography and Data Security10.1007/978-3-031-78676-1_21(365-383)Online publication date: 22-Feb-2025
- O'Connell SSour LMagen RGenkin DOren YShacham HYarom YBalzarotti DXu W(2024)Pixel thiefProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699087(3331-3348)Online publication date: 14-Aug-2024
- Wang PPaccagnella RWahby RBrown FBalzarotti DXu W(2024)Bending microarchitectural weird machines towards practicalityProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698962(1099-1116)Online publication date: 14-Aug-2024
- Show More Cited By