Invulnerability invariants for software controlled speculation
Abstract Spectre class of transient execution security attacks on modern microprocessors rely on speculative execution. Software Controlled Speculation (SCS) was proposed as a microarchitecture‐level defense in the original Spectre paper and has also been adopted by ARM. The idea with SCS is to allo...
Saved in:
| Main Authors: | Nimish Mathure, Sudarshan K. Srinivasan, Kushal K. Ponugoti |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-12-01
|
| Series: | Electronics Letters |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ell2.70108 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits
by: Kushal K. Ponugoti, et al.
Published: (2022-09-01) -
VP_TT: A value propagation based equivalence checker for testability transformations
by: Ramanuj Chouksey, et al.
Published: (2021-02-01) -
Automation of Formal Verification of Programs in the Pifagor Language
by: M. S. Ushakova, et al.
Published: (2015-08-01) -
Functionally-Equivalent Formalization and Automated Model Checking of Function Block Diagrams
by: Tomas Ausberger, et al.
Published: (2025-01-01) -
Analysis of information flow security using software implementing business logic based on stored database program blocks
by: A. А. Timakov
Published: (2024-04-01)