POSTER: Restricting Control Flow During Speculative Execution

4Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Speculative execution is one of the key techniques that modern processors use to boost performance. However, recent research shows that speculative execution can be used to steal sensitive data. We present a software-based solution to mitigate Spectre attacks by restricting the control flow of speculatively-executed instructions.

Cite

CITATION STYLE

APA

Shen, Z., Zhou, J., Ojha, D., & Criswell, J. (2018). POSTER: Restricting Control Flow During Speculative Execution. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2018-January, pp. 2297–2299). Association for Computing Machinery. https://doi.org/10.1145/3243734.3278522

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free