Chl
´
adek, J. (2020). rust-spectre https://github.com/
movrsprbp/rust-spectre.
de Mooij, J. (2019). [Meta] Spectre JIT mitigations https:
//bugzilla.mozilla.org/show bug.cgi?id=1430049.
Duete, L. (2018). spectre-go https://github.com/lucasduete/
spectre-go.
Evtyushkin, D., Ponomarev, D., & Abu-Ghazaleh, N.
(2016). Jump over ASLR: Attacking branch predic-
tors to bypass ASLR. In MICRO.
Fustos, J., Farshchi, F., & Yun, H. (2019). SpectreGuard:
An Efficient Data-centric Defense Mechanism against
Spectre Attacks. In DAC.
GCC.GNU.ORG (2020). Other built-in functions provided
by gcc https://gcc.gnu.org/onlinedocs/gcc-10.2.0/gcc/
Other-Builtins.html#Other-Builtins.
Ge, Q., Yarom, Y., Cock, D., & Heiser, G. (2016). A Sur-
vey of Microarchitectural Timing Attacks and Coun-
termeasures on Contemporary Hardware. Journal of
Cryptographic Engineering.
Gross, A. (2019). Java and speculative execution vulner-
abilities https://mail.openjdk.java.net/pipermail/vuln-
announce/2019-July/000002.html.
Horn, J. (2018). speculative execution, variant 4: specula-
tive store bypass.
Jiang, J. L. (2018). Using intel® compilers to mit-
igate speculative execution side-channel issues
https://software.intel.com/content/www/us/en/
develop/articles/using-intel-compilers-to-mitigate-
speculative-execution-side-channel-issues.html.
Khasawneh, K. N., Koruyeh, E. M., Song, C., Evtyushkin,
D., Ponomarev, D., & Abu-Ghazaleh, N. (2019). Safe-
Spec: Banishing the Spectre of a Meltdown with
Leakage-Free Speculation. In DAC.
Kiriansky, V., Lebedev, I., Amarasinghe, S., Devadas, S., &
Emer, J. (2018). DAWG: A Defense Against Cache
Timing Attacks in Speculative Execution Processors.
In MICRO.
Kocher, P., et al. (2019). Spectre Attacks: Exploiting Spec-
ulative Execution. In S&P.
Kocher, P. C. (1996). Timing Attacks on Implementations
of Diffe-Hellman, RSA, DSS, and Other Systems. In
CRYPTO.
Koruyeh, E. M., Khasawneh, K., Song, C., & Abu-
Ghazaleh, N. (2018). Spectre Returns! Speculation
Attacks using the Return Stack Buffer. In WOOT.
Lattner, C. & Adve, V. S. (2004). LLVM: A compilation
framework for lifelong program analysis & transfor-
mation. In IEEE / ACM International Symposium on
Code Generation and Optimization – CGO.
Lee, S., Shih, M., Gera, P., Kim, T., Kim, H., & Peinado,
M. (2017). Inferring Fine-grained Control Flow Inside
SGX Enclaves with Branch Shadowing. In USENIX
Security Symposium.
Leroy, X. (2020). cryptokit/cryptokit.mli at release1161
https://github.com/xavierleroy/cryptokit/blob/
release1161/src/cryptokit.mli#L148.
Leroy, X., Doligez, D., Frisch, A., Garrigue, J., R
´
emy, D.,
& Vouillon, J. (2020). The OCaml system release 4.11
– Documentation and user’s manual https://caml.inria.
fr/pub/docs/manual-ocaml/.
Lipp, M., et al. (2018). Meltdown: Reading Kernel Memory
from User Space. In USENIX Security Symposium.
Lu, H. (2018). x86: Cve-2017-5715, aka spectre
https://gcc.gnu.org/legacy-ml/gcc-patches/2018-
01/msg00422.html.
Maisuradze, G. & Rossow, C. (2018). ret2spec: Speculative
Execution Using Return Stack Buffers. In CCS.
Malak, M. & nilskp (2018). Meltdown/spectre https://users.
scala-lang.org/t/meltdown-spectre/2195.
Mcilroy, R., Sevcik, J., Tebbi, T., Titzer, B. L., & Ver-
waest, T. (2019). Spectre is here to stay: An
analysis of side-channels and speculative execution.
arXiv:1902.05178.
Microsoft (2018). Mitigating speculative execution
side-channel attacks in Microsoft Edge and Internet
Explorer https://blogs.windows.com/msedgedev/
2018/01/03/speculative-execution-mitigations-
microsoft-edge-internet-explorer/.
Mittal, S. (2018). A Survey of Techniques for Dynamic
Branch Prediction. arxiv:1804.00261 http://arxiv.org/
abs/1804.00261.
Munday, M. (2020). consider extending ’-spectre’ op-
tion to other architectures https://github.com/golang/
go/issues/38066.
OCAML.ORG (2021). File manipulation https://ocaml.org/
learn/tutorials/file manipulation.html.
Oleksenko, O., Trach, B., Reiher, T., Silberstein, M., & Fet-
zer, C. (2018). You Shall Not Bypass: Employing
data dependencies to prevent Bounds Check Bypass.
arXiv:1805.08506.
Oracle (2020). Oracle graalvm enterprise edition 20
guide https://docs.oracle.com/en/graalvm/enterprise/
20/docs/reference-manual/jvm/Options/.
Oracle (2021). Oracle JVM Security Enhance-
ments https://docs.oracle.com/en/database/oracle/
oracle-database/21/nfcon/oracle-jvm-security-
enhancements-274058639.html.
Palit, T., Monrose, F., & Polychronakis, M. (2019). Mitigat-
ing data leakage by protecting memory-resident sen-
sitive data. In ACSAC.
Pardoe, A. (2018). Spectre mitigations in msvc
https://devblogs.microsoft.com/cppblog/spectre-
mitigations-in-msvc/.
Pizlo, F. (2018). What Spectre and Meltdown mean for We-
bKit.
Randall, K. (2020). consider extending ’-spectre’ op-
tion to other architectures https://github.com/golang/
go/issues/38066.
Schwarz, M., Lipp, M., & Canella, C. (2018).
misc0110/PTEditor: A small library to mod-
ify all page-table levels of all processes
from user space for x86 64 and ARMv8
https://github.com/misc0110/PTEditor.
Schwarz, M., Lipp, M., Canella, C., Schilling, R., Kargl, F.,
& Gruss, D. (2020). ConTExT: A Generic Approach
for Mitigating Spectre. In NDSS.
support, M. (2020). Kb4073225 - sql server guid-
ance to protect against spectre, meltdown
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
58