Attacks like Spectre abuse speculative execution, one of the key perform...
Algorithms such as Differentially Private SGD enable training machine
le...
Speculative vulnerabilities such as Spectre and Meltdown expose speculat...
Since the discovery of Spectre, a large number of hardware mechanisms fo...
Flushing the cache, using instructions like clflush and wbinvd, is commo...
We show how to infer deterministic cache replacement policies using
off-...
To continuously improve quality and reflect changes in data, machine
lea...
Since the advent of SPECTRE, a number of countermeasures have been propo...
Many micro-architectural attacks rely on the capability of an attacker t...
Modern computer architectures rely on caches to reduce the latency gap
b...