Two methods for exploiting speculative control flow hijacks.
Two methods for exploiting speculative control flow hijacks.
Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus
01 May 2019
Venue : WOOT @ USENIX Security Symposium
External Link: https://www.usenix.org/conference/woot19/presentation/mambretti