Two methods for exploiting speculative control flow hijacks.

Two methods for exploiting speculative control flow hijacks.

Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus

01 May 2019


Venue : WOOT @ USENIX Security Symposium

External Link: https://www.usenix.org/conference/woot19/presentation/mambretti