Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens

Journal title: 2024 IEEE Symposium on Security and Privacy (SP)

Journal publisher: IEEE

Published year: 2024

DOI identifier: 10.1109/SP54263.2024.00047