Cited By
View all- Peters MGaudin NThoma JLapôtre VCotret PGogniat GGüneysu TQuek TGao DZhou JCardenas A(2024)On The Effect of Replacement Policies on The Security of Randomized Cache ArchitecturesProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637677(483-497)Online publication date: 1-Jul-2024
- Thoma JNiesler CFunke DLeander GMayr PPohl NDavi LGüneysu TCalandrino JTroncoso C(2023)CLEPSYDRACACHEProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620349(1991-2008)Online publication date: 9-Aug-2023
- Naghibijouybari HKoruyeh EAbu-Ghazaleh N(2022)Microarchitectural Attacks in Heterogeneous Systems: A SurveyACM Computing Surveys10.1145/354410255:7(1-40)Online publication date: 15-Dec-2022
- Show More Cited By