Paper-Conference

Peripheral Instinct: How External Devices Breach Browser Sandboxes
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks
CacheWarp: Software-based Fault Injection using Selective State Reset
Efficient and Generic Microarchitectural Hash-Function Recovery
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Reviving Meltdown 3a
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Hammulator: Simulate Now-Exploit Later
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs