Paper-Conference

Zero-Store Elimination and its Implications on the SIKE Cryptosystem
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
Confusing Value with Enumeration: Studying the Use of CVEs in Academia
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution
Taming the Linux Memory Allocator for Rapid Prototyping
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage
Do Compilers Break Constant-time Guarantees?
Lixom: Protecting Encryption Keys with Execute-Only Memory
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
ShadowLoad: Injecting State into Hardware Prefetchers