Paper-Conference
Peripheral Instinct: How External Devices Breach Browser Sandboxes No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks CacheWarp: Software-based Fault Injection using Selective State Reset Efficient and Generic Microarchitectural Hash-Function Recovery A Rowhammer Reproduction Study Using the Blacksmith Fuzzer Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels Hammulator: Simulate Now-Exploit Later A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs