Linked Presentation: The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsUltimate SLH: Taking Speculative Load Hardening to the Next LevelThe Gates of Time: Improving Cache Attacks with Transient ExecutionBunnyHop: Exploiting the Instruction Prefetcher