Search Results for author: Daniel Lustig

Found 1 papers, 0 papers with code

MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols

no code implementations11 Feb 2018 Caroline Trippel, Daniel Lustig, Margaret Martonosi

But more importantly, both Prime attacks exploit invalidation-based coherence protocols to achieve the same level of precision as a Flush+Reload attack.

Cryptography and Security Hardware Architecture

Cannot find the paper you are looking for? You can Submit a new open access paper.