Follow
Alexandra Sandulescu
Alexandra Sandulescu
Unknown affiliation
Verified email at google.com
Title
Cited by
Cited by
Year
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2282019
Bypassing memory safety mechanisms through speculative control flow hijacks
A Mambretti, A Sandulescu, A Sorniotti, W Robertson, E Kirda, A Kurmus
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 633-649, 2021
192021
Two methods for exploiting speculative control flow hijacks
A Mambretti, A Sandulescu, M Neugschwandtner, A Sorniotti, A Kurmus
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
162019
Elastic program transformations: automatically optimizing the reliability/performance trade-off in systems software
JB Wagner
EPFL, 2017
92017
Matthias Neugschwandt ner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, and Anil Kurmus. SMoTherSpectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu
ACM Conference on Computer and Communications Security (CCS), 2019
72019
GhostBuster: Understanding and overcoming the pitfalls of transient execution vulnerability checkers
A Mambretti, P Convertini, A Sorniotti, A Sandulescu, E Kirda, A Kurmus
2021 IEEE International Conference on Software Analysis, Evolution and …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–6