Lines Matching full:pdf
224 …Returns! Speculation Attacks using the Return Stack Buffer <https://arxiv.org/pdf/1807.07940.pdf>`_
228 …ments/processor-tech-docs/programmer-references/software-techniques-for-managing-speculation.pdf>`_
234 …ntent/dam/amd/en/documents/processor-tech-docs/programmer-references/24594.pdf>`_. SBPB behaves t…
236 …Attacks: Exploiting Speculative Execution <https://comsec.ethz.ch/wp-content/files/ibpb_sp25.pdf>`_
240 …ntent/dam/amd/en/documents/resources/technical-guidance-for-mitigating-branch-type-confusion.pdf>`_
244 …s://www.amd.com/content/dam/amd/en/documents/processor-tech-docs/programmer-references/24593.pdf>`_
250 …de Execution with Return Instruction <https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf>`_
252 …ntent/dam/amd/en/documents/resources/technical-guidance-for-mitigating-branch-type-confusion.pdf>`_
254 …d.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf>`_
256 …ith Training in Transient Execution <https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf>`_
264 …t Cross-Privilege Spectre-v2 Attacks <http://download.vusec.net/papers/bhi-spectre-bhb_sec22.pdf>`_