Two methods for exploiting speculative control flow hijacks [pdf] usenix.org 3 points by isido 7 years ago · 0 comments Reader PiP Save No comments yet.