Axiomatic hardware-software contracts for security

Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel
[doi] [ISBN] [Google Scholar] [DBLP] [Citeseer] [url]

Proceedings of the 49th Annual International Symposium on Computer Architecture
ISCA '22
New York, New York
Association for Computing Machinery
New York, NY, USA
Pages 72-86
Note(s): weak memory, CPU verification, ISA specification, side-channel, speculative execution, uspec