References
Table of contents
- Table of contents
- Digital system design and tools
- Instruction Set Architecture
- Processor microarchitecture & design
- Microarchitecture isolation
- Power & electromagnetic side-channels
Digital system design and tools
Notes:
Notes:
Instruction Set Architecture
[Patt2017]:
Computer Organization and Design RISC-V Edition: The Hardware Software Interface
April 2017Notes:
Notes:
Notes:
Processor microarchitecture & design
[Henn2011]:
Computer Architecture: A Quantitative Approach
September 2011Notes:
Microarchitecture isolation
[Ge2018a]:
No Security Without Time Protection: We Need a New Hardware-Software Contract
9th Asia-Pacific Workshop on Systems (APSys'18), 2018Link
Notes:
[Koch2019]:
Spectre Attacks: Exploiting Speculative Execution
40th IEEE Symposium on Security and Privacy (S&P'19), May 2019Link
Notes:
There is a note.[Lipp2018]:
Meltdown: Reading Kernel Memory from User Space
27th USENIX Security Symposium (USENIX Security'18), August 2018Link
Notes:
[Van2018]:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient out-of-Order Execution
27th USENIX Security Symposium (USENIX Security'18), August 2018Notes:
[Weis2018]:
Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient out-of-Order Execution
2018Notes:
Power & electromagnetic side-channels
[Mars2021a]:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation: A Study of Micro-Architectural Power Leakage across Many Devices
November 2021