Reproducing spectre attack with gem5: How to do It right?

Ayoub, Pierre; Maurice, Clémentine

2nd place of the Student Competition


Type:
Talk
City:
Tel Aviv
Date:
2021-02-01
Department:
Sécurité numérique
Eurecom Ref:
6575
Copyright:
© EURECOM. Personal use of this material is permitted. The definitive version of this paper was published in and is available at :
See also:

PERMALINK : https://www.eurecom.fr/publication/6575