Old Web
English
Sign In
Acemap
>
Paper
>
Two methods for exploiting speculative control flow hijacks
Two methods for exploiting speculative control flow hijacks
2019
Andrea Mambretti
Alexandra Sandulescu
Matthias Neugschwandtner
Alessandro Sorniotti
Anil Kurmus
Keywords:
Control flow
Distributed computing
Computer science
Computer security
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
6
Citations
NaN
KQI
[]