{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:09Z","timestamp":1773511209707,"version":"3.50.1"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031171451","type":"print"},{"value":"9783031171468","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17146-8_9","type":"book-chapter","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T23:35:39Z","timestamp":1663803339000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Robust and\u00a0Scalable Process Isolation Against Spectre in\u00a0the\u00a0Cloud"],"prefix":"10.1007","author":[{"given":"Martin","family":"Schwarzl","sequence":"first","affiliation":[]},{"given":"Pietro","family":"Borrello","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Kogler","sequence":"additional","affiliation":[]},{"given":"Kenton","family":"Varda","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schuster","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,22]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, A., et al.: Spook.js: attacking chrome strict site isolation via speculative execution. In: S &P (2022)","DOI":"10.1109\/SP46214.2022.9833711"},{"key":"9_CR2","unstructured":"Amazon, AWS Lambda@Edge (2019). https:\/\/aws.amazon.com\/lambda\/edge\/"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Anonymous. Anonymized for Double Blind Submission (2019)","DOI":"10.5194\/se-2019-97-RC1"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, A., et al.: SMoTherSpectre: exploiting speculative execution through port contention. In: CCS (2019)","DOI":"10.1145\/3319535.3363194"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Briongos, S., Irazoqui, G., Malag\u00f3n, P., Eisenbarth, T.: Detecting cache attacks through self-observation. In: CODASPY, Cacheshield (2018)","DOI":"10.1145\/3176258.3176320"},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701\u2013716 (2005)","journal-title":"Comput. Netw."},{"key":"9_CR7","unstructured":"Canella, C.: A systematic evaluation of transient execution attacks and defenses. In: USENIX Security Symposium. Extended classification tree and PoCs at (2019). https:\/\/transient.fail\/"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. ePrint 2015\/1034 (2015)","DOI":"10.1016\/j.asoc.2016.09.014"},{"key":"9_CR9","unstructured":"Cloudflare. Cloudflare Workers (2019). https:\/\/www.cloudflare.com\/products\/cloudflare-workers\/"},{"key":"9_CR10","unstructured":"Cloudflare. Cloudflare Workers (2019). https:\/\/blog.cloudflare.com\/cloud-computing-without-containers\/"},{"key":"9_CR11","unstructured":"Cloudflare. Anonymized for Double Blind Submission (2020)"},{"key":"9_CR12","unstructured":"Cloudflare. Limits - Cloudflare Workers (2021). https:\/\/developers.cloudflare.com\/workers\/platform\/limits"},{"key":"9_CR13","unstructured":"Corbet, J.: Finding Spectre vulnerabilities with smatch, April 2018. https:\/\/lwn.net\/Articles\/752408\/"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Crosby, S.A., Wallach, D.S., Riedi, R.H.: Opportunities and limits of remote timing attacks. ACM Trans. Inf. Syst. Sec. (TISSEC) 12(3), 17 (2009)","DOI":"10.1145\/1455526.1455530"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Das, S., Werner, J., Antonakakis, M., Polychronakis, M., Monrose, F.: Sok: the challenges, pitfalls, and perils of using hardware performance counters for security. In: S &P (2019)","DOI":"10.1109\/SP.2019.00021"},{"key":"9_CR16","unstructured":"Deno, A.: Globally Distributed JavaScript VM (2021). https:\/\/deno.com\/deploy"},{"key":"9_CR17","unstructured":"Fastly. Serverless Compute Environment - Fastly Compute@Edge (2021). https:\/\/www.fastly.com\/products\/edge-compute\/serverless"},{"key":"9_CR18","first-page":"1","volume":"8","author":"Q Ge","year":"2016","unstructured":"Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A Survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Crypt. Eng. 8, 1\u201327 (2016)","journal-title":"J. Crypt. Eng."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"G\u00f6kta\u015f, E., Razavi, K., Portokalidis, G., Bos, H., Giuffrida, C.: Hacking Blind in the Spectre Era. In: CCS, Speculative Probing (2020)","DOI":"10.1145\/3372297.3417289"},{"key":"9_CR20","unstructured":"Google. SafeSide: Understand and mitigate software-observable side-channels (2019). https:\/\/github.com\/google\/safeside"},{"key":"9_CR21","unstructured":"Google Project Zero. What is a \u201cgood\" memory corruption vulnerability? (2015). https:\/\/googleprojectzero.blogspot.com\/2015\/06\/what-is-good-memory-corruption.html"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: Practical Cache Attacks on the MMU. In: NDSS, ASLR on the Line (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault Attack in JavaScript. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Wagner, K., Mangard, S.: Flush+Flush: a fast and stealthy cache attack. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Guarnieri, M., K\u00f6pf, B., Morales, J.F., Reineke, J., S\u00e1nchez, A.: Principled detection of speculative information flows. In: S &P, SPECTECTOR (2020)","DOI":"10.1109\/SP40000.2020.00011"},{"key":"9_CR26","unstructured":"Gulmezoglu, B., Moghimi, A., Eisenbarth, T., Sunar, B.: FortuneTeller: predicting microarchitectural attacks via unsupervised deep learning. arXiv:1907.03651 (2019)"},{"key":"9_CR27","unstructured":"Hat, R.: Spectre and Meltdown Detector (2018). https:\/\/access.redhat.com\/labsinfo\/speculativeexecution"},{"key":"9_CR28","unstructured":"Herath, N., Fogh, A.: These are not your grand daddys CPU performance counters - CPU hardware performance counters for security. In: Black Hat Briefings (2015)"},{"key":"9_CR29","unstructured":"Horn, J.: speculative execution, variant 4: speculative store bypass (2018)"},{"key":"9_CR30","unstructured":"Intel. Intel Analysis of Speculative Execution Side Channels (2018). Revision 4.0"},{"key":"9_CR31","unstructured":"Intel. Speculative Execution Side Channel Mitigations (2018). Revision 3.0"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar., B.: Preventing microarchitectural attacks before distribution. In: CODASPY, Mascat (2018)","DOI":"10.1145\/3176258.3176316"},{"key":"9_CR33","unstructured":"Kocher, P.: Spectre Mitigations in Microsoft\u2019s C\/C++ Compiler (2018)"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Exploiting Speculative Execution. In: S &P, Spectre Attacks (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"9_CR35","unstructured":"Koruyeh, E.M., Khasawneh, K., Song,C., Abu-Ghazaleh, N.: Spectre returns! speculation attacks using the Return Stack Buffer. In: WOOT (2018)"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Lipp, M., Had\u017ei\u0107, V., Schwarz, M., Perais, A., Maurice, C., Gruss, D.: Exploring the security implications of AMD\u2019s cache way predictors. In: AsiaCCS, Take a Way (2020)","DOI":"10.1145\/3320269.3384746"},{"key":"9_CR37","unstructured":"Lipp, M., et al.: Reading kernel memory from user space. In: USENIX Security Symposium, Meltdown (2018)"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Maisuradze, G., Rossow, C.: ret2spec: speculative execution using return stack buffers. In: CCS (2018)","DOI":"10.1145\/3243734.3243761"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Malone, C., Zahran, M., Karri, R.: Are hardware performance counters a cost effective way for integrity checking of programs. In: STC (2011)","DOI":"10.1145\/2046582.2046596"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Mambretti,A., Neugschwandtner, M., Sorniotti, A., Kirda, E., Robertson, W., Kurmus, A.: Speculator: a tool to analyze speculative execution attacks and mitigations. In: ACM ACSAC (2019)","DOI":"10.1145\/3359789.3359837"},{"key":"9_CR41","unstructured":"Mcilroy, R., Sevcik, J., Tebbi, T., Titzer, B.L., Verwaest, T.: Spectre is here to stay: an analysis of side-channels and speculative execution. arXiv:1902.05178 (2019)"},{"key":"9_CR42","unstructured":"Microsoft. Azure serverless computing (2019). https:\/\/azure.microsoft.com\/en-us\/overview\/serverless-computing\/"},{"key":"9_CR43","doi-asserted-by":"publisher","first-page":"83871","DOI":"10.1109\/ACCESS.2020.2988370","volume":"8","author":"M Mushtaq","year":"2020","unstructured":"Mushtaq, M., et al.: WHISPER: a tool for run-time detection of side-channel attacks. IEEE Access 8, 83871\u201383900 (2020)","journal-title":"IEEE Access"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kemerlis, V.P., Sethumadhavan, S., Keromytis, A.D.: The spy in the sandbox: practical cache attacks in javaScript and their implications. In: CCS (2015)","DOI":"10.1145\/2810103.2813708"},{"key":"9_CR45","unstructured":"Park, S., Lee, S., Xu, W., Moon, H., Kim, T.: libmpk: software abstraction for intel memory protection keys. arXiv:1811.07276 (2018)"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Payer, M.: HexPADS: a platform to detect \u201cstealth\" attacks. In: ESSoS (2016)","DOI":"10.1007\/978-3-319-30806-7_9"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Qi, Z., et al.: Speculative taint analysis for discovering spectre gadgets. In: NDSS, Spectaint (2021)","DOI":"10.14722\/ndss.2021.24466"},{"key":"9_CR48","unstructured":"Reis, C., Moshchuk, A., Oskov, N.: Site isolation: process separation for web sites within the browser. In: USENIX Security Symposium (2019)"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Exploring information leakage in third party compute clouds. In: CCS, Hey, You, Get Off of My Cloud (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"9_CR50","unstructured":"Schrammel, D.: Domain keys-efficient in-process isolation for RISC-V and x86. In: USENIX Security Symposium (2020)"},{"key":"9_CR51","unstructured":"Schwarz, M., Canella, C., Giner, L., Gruss, D.: Store-to-leak forwarding: leaking data on meltdown-resistant CPUs. arXiv:1905.05725 (2019)"},{"key":"9_CR52","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lipp, M., Canella, C., Schilling, R., Kargl, F., Gruss, D.: A generic approach for mitigating spectre. In: NDSS, ConTExT (2020)","DOI":"10.14722\/ndss.2020.24271"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lipp, M., Gruss, D.: Real JavaScript and zero side-channel attacks. In: NDSS, JavaScript Zero (2018)","DOI":"10.14722\/ndss.2018.23094"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Maurice, C., Gruss, D., Mangard, S.: High-resolution microarchitectural attacks in javaScript. In: FC, Fantastic Timers and Where to Find Them (2017)","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Schwarzl, M., Lipp, M., Masters, J., Gruss, D.: Read arbitrary memory over network. In: ESORICS, NetSpectre (2019)","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"9_CR56","doi-asserted-by":"crossref","unstructured":"Schwarzl, M.: Robust and scalable process isolation against Spectre in the cloud (extended version) (2022). https:\/\/martinschwarzl.at\/media\/files\/robust_extended.pdf","DOI":"10.1007\/978-3-031-17146-8_9"},{"key":"9_CR57","unstructured":"Roettger, S., Janc, A.: A Spectre proof-of-concept for a Spectre-proof web (2021). https:\/\/security.googleblog.com\/2021\/03\/a-spectre-proof-of-concept-for-spectre.html"},{"key":"9_CR58","unstructured":"Titzer, b.: What spectre means for language implementers (2019). https:\/\/pliss2019.github.io\/ben_titzer_spectre_slides.pdf"},{"key":"9_CR59","unstructured":"Titzer, B.L., Sevcik, J.: A year with Spectre: a V8 perspective (2019). https:\/\/v8.dev\/blog\/spectre"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Tol, M.C., Yurtseven, K., Gulmezoglu, B., Sunar, B.: FastSpec: scalable generation and detection of Spectre gadgets using neural embeddings. arXiv:2006.14147 (2020)","DOI":"10.1109\/EuroSP51992.2021.00047"},{"key":"9_CR61","unstructured":"v8 developer blog (2020). https:\/\/v8.dev\/blog\/v8-release-83"},{"key":"9_CR62","unstructured":"Vahldiek-Oberwagner, A., Elnikety, E., Garg, D., Druschel, P.: ERIM: secure and efficient in-process isolation with memory protection keys. I: USENIX Security Symposium (2019)"},{"key":"9_CR63","unstructured":"Van Goethem, T., P\u00f6pper, C., Joosen, W., Vanhoef, M.: Timeless timing attacks: exploiting concurrency to leak secrets over remote connections. In: USENIX Security Symposium (2020)"},{"key":"9_CR64","doi-asserted-by":"crossref","unstructured":"Vila, P., K\u00f6pf, B., Morales, J.: Theory and practice of finding Eviction sets. In: S &P (2019)","DOI":"10.1109\/SP.2019.00042"},{"key":"9_CR65","doi-asserted-by":"publisher","first-page":"2504","DOI":"10.1109\/TSE.2019.2953709","volume":"47","author":"G Wang","year":"2019","unstructured":"Wang, G., Chattopadhyay, S., Gotovchits, I., Mitra, T., Roychoudhury, A.: oo7: low-overhead Defense against Spectre attacks via Program Analysis. Trans. Softw. Eng. 47, 2504\u20132519 (2019)","journal-title":"Trans. Softw. Eng."},{"key":"9_CR66","doi-asserted-by":"crossref","unstructured":"Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., Homayoun, H.: Hybrid-shield: accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks. In: ICCAD (2020)","DOI":"10.1145\/3400302.3418783"},{"key":"9_CR67","doi-asserted-by":"crossref","unstructured":"Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., Mohsenin, T., Homayoun, H.: Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks. In: GLSVLSI (2020)","DOI":"10.1145\/3386263.3407586"},{"key":"9_CR68","doi-asserted-by":"crossref","unstructured":"Wang, X., Karri, R.: Numchecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. In: DAC (2013)","DOI":"10.1145\/2463209.2488831"},{"key":"9_CR69","unstructured":"Xia, Y., Liu, Y., Chen, H., Zang, B. Detecting violation of control flow integrity using performance counters. In: DSN, CFIMon (2012)"},{"key":"9_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhang, Y., Lee, R.B.: CloudRadar: a real-time side-channel attack detection system in clouds. In: RAID (2016)","DOI":"10.1007\/978-3-319-45719-2_6"},{"key":"9_CR71","doi-asserted-by":"crossref","unstructured":"Zhang, Z.: Detecting malware in SGX enclaves with SGX-Bouncer. In: AsiaCCS, See through Walls (2021)","DOI":"10.1145\/3433210.3437531"},{"key":"9_CR72","doi-asserted-by":"crossref","unstructured":"Zhou, B., Gupta, A., Jahanshahi, R., Egele, M., Joshi, A.: Hardware performance counters can detect malware: Myth or fact? In: AsiaCCS (2018)","DOI":"10.1145\/3196494.3196515"},{"key":"9_CR73","doi-asserted-by":"crossref","unstructured":"Zhou, H., Xin, W., Shi, W., Yuan, J., Liang, B.: Detecting rop attacks using performance monitoring counters. In: ISPEC, Hdrop (2014)","DOI":"10.1007\/978-3-319-06320-1_14"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17146-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T22:04:22Z","timestamp":1666217062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17146-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171451","9783031171468"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17146-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}