usenix_logo_notag_white
Sign In
Conferences
Attend
Registration Information
Venue, Hotel, and Travel
Services
Program
Workshop Program
Birds-of-a-Feather Sessions (BoFs)
Participate
Call for Papers
Instructions for Presenters
Artifact Evaluation Information
Call for Artifacts
Sponsors
About
Workshop Organizers
Questions
Past Workshops
Conference Policies
Code of Conduct
Alessandro Sorniotti
Linked Presentation:
Two methods for exploiting speculative control flow hijacks