Source: securityboulevard.com – Author: Marc Handelman
Authors/Presenters: Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2024/2/26/usenix-security-23-synchronization-storage-channels-s2c-timer-less-cache-side-channel-attacks-on-the-apple-m1-via-hardware-synchronization-instructions
Original Post URL: https://securityboulevard.com/2024/02/usenix-security-23-synchronization-storage-channels-s2c-timer-less-cache-side-channel-attacks-on-the-apple-m1-via-hardware-synchronization-instructions/
Category & Tags: Security Bloggers Network,Open Access Research,Security Conferences,Security Research,USENIX,USENIX Enigma ’23 – Security Bloggers Network,Open Access Research,Security Conferences,Security Research,USENIX,USENIX Enigma ’23
Views: 0