Paper-Conference
Zero-Store Elimination and its Implications on the SIKE Cryptosystem RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs Confusing Value with Enumeration: Studying the Use of CVEs in Academia SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution Taming the Linux Memory Allocator for Rapid Prototyping Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage Do Compilers Break Constant-time Guarantees? Lixom: Protecting Encryption Keys with Execute-Only Memory Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting ShadowLoad: Injecting State into Hardware Prefetchers