[1]吴晓慧, 贺也平, 马恒太, 等. 微架构瞬态执行攻击与防御方法[J]. 软件学报, 2020, 31(2): 544563[2]Xiong Wenjie, Szefer J. Survey of transient execution attacks and their mitigations[J]. ACM Computing Surveys, 2021, 54(3): 136[3]李扬, 高菲, 马自强, 等. 瞬态执行攻击防御方法研究进展[J]. 计算机工程与应用, 2025, 61(2): 3758[4]Lipp M, Schwarz M, Gruss D, et al. Meltdown: Reading kernel memory from user space[J]. Communications of the ACM, 2020, 63(6): 4656[5]Kocher P, Horn J, Fogh A, et al. Spectre attacks: Exploiting speculative execution[C] Proc of the 2019 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE,2019: 119[6]Liu Fangfei, Yarom Y, Ge Qian, et al. Lastlevel cache sidechannel attacks are practical[C] Proc of the 2015 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2015: 605622[7]Kiriansky V, Waldspurger C. Speculative buffer overflows: Attacks and defenses[J]. arXiv preprint, arXiv:1807.03757, 2018[8]Sternberger M. Spectreng: An avalanche of attacks[COL] Proc of the 4th Wiesbaden Workshop on Advanced Microkernel Operating Systems. 2018 [20240223]. https:www.cs.hsrm.de~kaisereventswamos2018wamos18proceedings.pdf#page=23[9]RedHat Cor. Spectre variant 1 scanning tool[EBOL]. (20180821) [20240715]. https:access.redhat.comblogs766093posts3510331[10]Wang G, Chattopadhyay S, Gotovchits I, et al. Oo7: Lowoverhead defense against spectre attacks via program analysis[J]. IEEE Trans on Software Engineering, 2019, 47(11): 25042519[11]Oleksenko O, Trach B, Silberstein M, et al. SpecFuzz: Bringing spectretype vulnerabilities to the surface[C] Proc of the 29th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2020: 14811498[12]汪美琴, 夏旸, 贾琼, 等. 模糊测试技术的研究进展与挑战[J]. 信息安全研究, 2024, 10(7): 668674[13]Qi Z, Feng Q, Cheng Y, et al. SpecTaint: Speculative taint analysis for discovering spectre gadgets[COL] Proc of the Network and Distributed System Security Symposium. 2021: 841855 [20250820]. https:dx.doi.org10.14722ndss.2021.23466[14]Yarom Y, Falkner K. Flush+ Reload: A high resolution, low noise, L3 cache sidechannel attack[C] Proc of the 23rd USENIX Security Symposium. Berkeley, CA: USENIX Association, 2014: 719732[15]Microsoft Cor. Spectre mitigations inmsvc[EBOL].(20180419) [20240715]. https:devblogs.microsoft.comcppblogspectremitigationsinmsvc[16]Wang G, Chattopadhyay S, Biswas A K, et al. KLEESpectre: Detecting information leakage through speculative cache attacks via symbolic execution[J]. ACM Trans on Software Engineering and Methodology, 2020, 29(3): 131[17]Guarnieri M, Kpf B, Morales J F, et al. Spectector: Principled detection of speculative information flows[C] Proc of the 2020 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2020: 119[18]崔展齐, 张家铭, 郑丽伟, 等. 覆盖率制导的灰盒模糊测试研究综述[J]. 计算机学报, 2024, 47(7): 16651696[19]Kocher P. Spectremitigations in Microsoft’s CC++ compiler[EBOL]. (20180213)[20250226]. https:www.paulkocher.comdocMicrosoftCompilerSpectreMitigation.html[20]Nodejs. Httpparser: http requestresponse parser for c[EBOL]. (20190421) [20240714]. https:github.comnodejshttpparser[21]Google. JSMN: A world fastest JSON parsertokenizer[EBOL]. (20190413) [20240714]. https:github.comzsergejsmn[22]Google. Brotil: A genericpurpose lossless compression algorithm[EBOL]. (20181026) [20240714]. https:github.comgooglebrotli[23]The YAML Project. LibYAML: A C library for parsing and emitting YAML[EBOL]. (20190521) [20240714]. https:github.comyamllibyaml[24]OISF. Libhtp: A securityaware parser for the HTTP protocol and the related bits and pieces[EBOL]. (20190513) [20240714]. https:github.comOISFlibhtp[25]OpenSSL. OpenSSL: TLSSSL and crypto library[EBOL]. (20210903) [20240714]. https:github.comopensslopenssl |