نتایج جستجو برای: speculative attacks

تعداد نتایج: 63586  

Journal: :Humanities & social sciences communications 2023

Abstract The foreign exchange markets, renowned as the largest financial markets globally, also stand out one of most intricate due to their substantial volatility, nonlinearity, and irregular nature. Owing these challenging attributes, various research endeavors have been undertaken effectively forecast future currency prices in with precision. studies performed built models utilizing statisti...

Journal: :Communications of The ACM 2021

Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that over microarchitectural covert channels. This paper proposes speculative taint tracking (STT), a high performance hardware mechanism to block these attacks. The main idea is it safe execute selectively forward the results instructi...

2003
Michael Kumhof

This paper analyzes a small open economy model under a monetary regime that targets the consumer price index. It is explained why such a regime is vulnerable to speculative currency attacks. There are two differences to the exchange rate targeting case: (i) The attack takes place over a short period of time as opposed to instantaneously. (ii) Reserve losses attributable to the attack are smalle...

2011
Chong Huang Itay Goldstein Qingmin Liu Harold Cole David Dillenberger Hanming Fang Johannes Hörner Matthew Jackson Steven Matthews Stephen Morris Ichiro Obara Santiago Oliveros Mallesh Pai Alessandro Pavan David Rahman Thomas Wiseman

How does the central bank’s incentive to build a reputation affect speculators’ ability to coordinate and the likelihood of the devaluation outcome during speculative currency crises? What role does market information play in speculators’ coordination and the central bank’s reputation building? I address these questions in a dynamic regime change game that highlights the interaction between the...

Journal: :Lecture Notes in Computer Science 2023

Abstract Many types of attacks on confidentiality stem from the nondeterministic nature environment that computer programs operate in. We focus verification in environments by reasoning about asynchronous hyperproperties . generalize temporal logic to allow nested trajectory quantification, where a determines how different execution traces may advance and stutter. propose bounded model checking...

2003
Lawrence J. Lau Isabel K. Yan

This paper is the first to apply a nested logit model to measure the probabilities of speculative attacks and the probabilities of successful defenses by the central banks. This model allows us to predict not only the probability of speculative attacks but also the probability of successful defenses given attacks. Also, it provides a framework to analyze the degree to which different factors af...

2010
Xu Hu

In a stylized continuous-time model of a small open economy with perfect capital mobility and a pegged exchange rate, I analyze an experiment in which domestic residents expect a future devaluation. Taking the public’s expectations as exogenous and allowing them to be divergent, I analyze in a short time period before the expected devaluation takes place how transactions of short-term collatera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید