• Skip to primary navigation
  • Skip to content
  • Skip to footer
Zhuojia Shen's Personal Website Zhuojia Shen's Personal Website
  • Publications
  • CV
    Zhuojia Shen

    Zhuojia Shen

    Software Engineer at Apple

    • Sunnyvale, CA, USA
    • Email
    • Website
    • GitHub
    • LinkedIn
    • Google Scholar
    • ORCID

    POSTER: Restricting Control Flow During Speculative Execution

    Speculative execution is one of the key techniques that modern processors use to boost performance. However, recent research shows that speculative execution can be used to steal sensitive data. We present a software-based solution to mitigate Spectre attacks by restricting the control flow of speculatively-executed instructions.

    Direct link PDF BibTeX

    Updated: October 15, 2018

    Share on

    Twitter Facebook LinkedIn
    Previous Next
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    
    @inproceedings{Venkman@CCS18,
      author = {Shen, Zhuojia and Zhou, Jie and Ojha, Divya and Criswell, John},
      title = {{POSTER}: Restricting Control Flow During Speculative Execution},
      booktitle = {Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
      series = {CCS '18},
      isbn = {978-1-4503-5693-0},
      location = {Toronto, ON, Canada},
      pages = {2297--2299},
      numpages = {3},
      url = {https://doi.org/10.1145/3243734.3278522},
      doi = {10.1145/3243734.3278522},
      publisher = {ACM},
      address = {New York, NY, USA},
      year = {2018},
      month = Oct,
    }
    
    • Follow:
    • GitHub
    • LinkedIn
    • Google Scholar
    • ORCID
    © 2024 Zhuojia Shen. Powered by Jekyll & Minimal Mistakes.