Montasari, Reza; Hosseinian-Far, Amin; Hill, Richard; … - In: International Journal of Organizational and Collective … 8 (2018) 2, pp. 32-59
This article describes how there exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural attacks, the result of these vulnerabilities, take advantage of microarchitectural performance of processor...