The following publications are possibly variants of this publication:
- Spectre attacks: exploiting speculative executionPaul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas 0004, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher 0002, Michael Schwarz 0001, Yuval Yarom. CACM, 63(7):93-101, 2020. [doi]
- SpecHammer: Combining Spectre and Rowhammer for New Speculative AttacksYoussef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin. sp 2022: 681-698 [doi]
- MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative StateSam Ainsworth, Timothy M. Jones 0001. isca 2020: 132-144 [doi]
- Speculative Decoding: Exploiting Speculative Execution for Accelerating Seq2seq GenerationHeming Xia, Tao Ge 0001, Peiyi Wang, Si-Qing Chen, Furu Wei, Zhifang Sui. emnlp 2023: 3909-3925 [doi]
- Systematic Analysis of Programming Languages and Their Execution Environments for Spectre AttacksAmir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss. icissp 2022: 48-59 [doi]
- Exploiting Security Dependence for Conditional Speculation Against Spectre AttacksLutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Peng Liu 0005, Lixin Zhang 0002, Dan Meng. TC, 70(7):963-978, 2021. [doi]