Speculative execution attacks leverage the speculative and out-of-order
...
As mobile devices are becoming ubiquitous, regularly interacting with a
...
Spectre and Meltdown attacks and their variants exploit hardware perform...
In this paper, we show that sensor-based impostor detection with deep
le...
Attacks against the control processor of a power-grid system, especially...
Internet of things (IoT) applications have become increasingly popular i...