Start · Paper List (Normalized: Citations/Year) · Papers/Citations per Year (Plot) · Names in Top-h5 · Person Citations per Year · Top-h5 Papers per Person
Pos Paper Citations Year
1 Spectre Attacks: Exploiting Speculative Execution 4024 2019
2 Meltdown: Reading Kernel Memory from User Space 3242 2018
3 Flush+Flush: A Fast and Stealthy Cache Attack 969 2016
4 ZombieLoad: Cross-Privilege-Boundary Data Sampling 706 2019
5 Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches 703 2015
6 DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks 697 2016
7 A Systematic Evaluation of Transient Execution Attacks and Defenses 677 2019
8 ARMageddon: Cache Attacks on Mobile Devices 671 2016
9 Malware Guard Extension: Using SGX to Conceal Cache Attacks 656 2017
10 Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript 654 2016
11 Plundervolt: Software-based Fault Injection Attacks against Intel SGX 589 2020
12 Drammer: Deterministic Rowhammer Attacks on Mobile Platforms 542 2016
13 Fallout: Leaking data on meltdown-resistant cpus 531 2019
14 LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection 430 2020
15 Another Flip in the Wall of Rowhammer Defenses 401 2018
16 Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR 396 2016
17 Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory 372 2017
18 KASLR is Dead: Long Live KASLR 371 2017
19 NetSpectre: Read Arbitrary Memory over Network 361 2019
20 PLATYPUS: Software-based Power Side-Channel Attacks on x86 361 2021
21 Rambleed: Reading bits in memory without accessing them 335 2020
22 ScatterCache: Thwarting Cache Attacks via Cache Set Randomization 317 2019
23 Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud 246 2017
24 Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript 214 2017
25 Nethammer: Inducing Rowhammer Faults through Network Requests 207 2020
26 ConTExT: A Generic Approach for Mitigating Spectre 168 2020
27 Donky: Domain Keys–Efficient In-Process Isolation for RISC-V and x86 163 2020
28 Practical enclave malware with Intel SGX 146 2019
29 Systematic Analysis of Randomization-based Protected Cache Architectures 136 2021
30 Half-Double: Hammering From the Next Row Over 132 2022
Imprint