Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor K Xu, M Tang, H Wang, S Guilley IEEE Transactions on Computers 72 (2), 360-373, 2022 | 3 | 2022 |
Cache Bandwidth Contention Leaks Secrets H Wang, M Tang, K Xu, Q Wang 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2024 | 2* | 2024 |
Cross‐Core and Robust Covert Channel Based on Macro‐Op Fusion H Wang, M Tang Security and Communication Networks 2023 (1), 8031859, 2023 | 2 | 2023 |
BackCache: Mitigating contention-based cache timing attacks by hiding cache line evictions Q Wang, X Zhang, H Wang, Y Gu, M Tang arXiv preprint arXiv:2304.10268, 2023 | 1 | 2023 |
Exploitation of Security Vulnerability on Retirement K Xu, M Tang, Q Wang, H Wang 2024 IEEE International Symposium on High-Performance Computer Architecture …, 2024 | | 2024 |
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities Q Wang, M Tang, K Xu, H Wang 2024 IEEE International Symposium on High-Performance Computer Architecture …, 2024 | | 2024 |
One more set: Mitigating conflict-based cache side-channel attacks by extending cache set Y Gu, M Tang, Q Wang, H Wang, H Ding Journal of Systems Architecture 144, 102997, 2023 | | 2023 |