{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:14Z","timestamp":1755839534112,"version":"3.40.3"},"publisher-location":"Cham","reference-count":79,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031334870"},{"type":"electronic","value":"9783031334887"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33488-7_2","type":"book-chapter","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T16:01:43Z","timestamp":1685289703000},"page":"33-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Layered Binary Templating"],"prefix":"10.1007","author":[{"given":"Martin","family":"Schwarzl","sequence":"first","affiliation":[]},{"given":"Erik","family":"Kraft","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"2_CR1","unstructured":"Antti Korpi: xkbcat (2021). https:\/\/github.com\/anko\/xkbcat"},{"key":"2_CR2","unstructured":"Bacs, A., Musaev, S., Razavi, K., Giuffrida, C., Bos, H.: DUPEFS: leaking data over the network with filesystem deduplication side channels. In: FAST (2022)"},{"key":"2_CR3","unstructured":"Baert, M.: wayland-keylogger (2022). https:\/\/github.com\/Aishou\/wayland-keylogger"},{"key":"2_CR4","unstructured":"Bernstein, D.J.: Cache-Timing Attacks on AES (2005). http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Borrello, P., D\u2019Elia, D.C., Querzoni, L., Giuffrida, C.: Constantine: automatic side-channel resistance using efficient control and data flow linearization. In: CCS (2021)","DOI":"10.1145\/3460120.3484583"},{"key":"2_CR6","unstructured":"Brasser, F., M\u00fcller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.R.: Software grand exposure: SGX cache attacks are practical. In: WOOT (2017)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Brennan, T., Rosner, N., Bultan, T.: JIT Leaks: inducing timing side channels through just-in-time compilation. In: S &P (2020)","DOI":"10.1109\/SP40000.2020.00007"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Brotzman, R., Liu, S., Zhang, D., Tan, G., Kandemir, M.: CaSym: cache aware symbolic execution for side channel detection and mitigation. In: S &P (2019)","DOI":"10.1109\/SP.2019.00022"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Brumley, B., Hakala, R.: Cache-Timing template attacks. In: AsiaCrypt (2009)","DOI":"10.1007\/978-3-642-10366-7_39"},{"key":"2_CR10","unstructured":"Carre, S., Dyseryn, V., Facon, A., Guilley, S., Perianin, T.: End-to-end automated cache-timing attack driven by machine learning. J. Cryptol. (2019)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Cauligi, S., et al.: FaCT: a flexible, constant-time programming language. In: SecDev (2017)","DOI":"10.1109\/SecDev.2017.24"},{"key":"2_CR12","unstructured":"CEF: Chrome Embedded Framework (2022). https:\/\/github.com\/chromiumembedded\/cef"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"2_CR14","unstructured":"Chromium: Speeding up Chrome\u2019s release cycle (2022). https:\/\/blog.chromium.org\/2021\/03\/speeding-up-release-cycle.html"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Chung, S.C., Lee, J.W., Chang, H.C., Lee, C.Y.: A high-performance elliptic curve cryptographic processor over GF(p) with SPA resistance. In: International Symposium on Circuits and Systems (ISCAS) (2012)","DOI":"10.1109\/ISCAS.2012.6271521"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Coppens, B., Verbauwhede, I., De Bosschere, K., De Sutter, B.: Practical mitigations for timing-based side-channel attacks on modern x86 processors. In: S &P (2009)","DOI":"10.1109\/SP.2009.19"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Costi, A., Johannesmeyer, B., Bosman, E., Giuffrida, C., Bos, H.: On the effectiveness of same-domain memory deduplication. In: European Workshop on Systems Security, pp. 29\u201335 (2022)","DOI":"10.1145\/3517208.3523754"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Crane, S., Homescu, A., Brunthaler, S., Larsen, P., Franz, M.: Thwarting cache side-channel attacks through dynamic software diversity. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23264"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Dall, F., et al.: Cachequote: efficiently recovering long-term secrets of SGX EPID via cache attacks. In: CHES (2018)","DOI":"10.46586\/tches.v2018.i2.171-191"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Diao, W., Liu, X., Li, Z., Zhang, K.: No pardon for the interruption: new inference attacks on android through interrupt timing analysis. In: S &P (2016)","DOI":"10.1109\/SP.2016.32"},{"key":"2_CR21","unstructured":"Domas, C.: M\/o\/Vfuscator (2015). https:\/\/github.com\/xoreaxeaxeax\/movfuscator"},{"key":"2_CR22","unstructured":"Doychev, G., Feld, D., Kopf, B., Mauborgne, L., Reineke, J.: CacheAudit: a tool for the static analysis of cache side channels. In: USENIX Security Symposium (2013)"},{"key":"2_CR23","unstructured":"Electron: Electron Apps (2022). https:\/\/www.electronjs.org\/apps"},{"key":"2_CR24","unstructured":"Electron JS: Electron Internals: Building Chromium as a Library (2022). https:\/\/www.electronjs.org\/blog\/electron-internals-building-chromium-as-a-library"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Fu, Y., Bauman, E., Quinonez, R., Lin, Z.: SGX-LAPD: thwarting controlled side channel attacks via enclave verifiable page faults. In: RAID (2017)","DOI":"10.1007\/978-3-319-66332-6_16"},{"key":"2_CR26","unstructured":"Garc\u00eda, C.P., Brumley, B.B.: Constant-time callees with variable-time callers. In: USENIX Security Symposium (2017)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., Eckert, M., Schinzel, S., M\u00fcller, T.: Cache attacks on intel SGX. In: EuroSec (2017)","DOI":"10.1145\/3065913.3065915"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Gruss, D., Bidner, D., Mangard, S.: Practical memory deduplication attacks in sandboxed JavaScript. In: ESORICS (2015)","DOI":"10.1007\/978-3-319-24174-6_6"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Gruss, D., et al.: Page cache attacks. In: CCS (2019)","DOI":"10.1145\/3319535.3339809"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Fogh, A., Lipp, M., Mangard, S.: Prefetch side-channel attacks: bypassing SMAP and kernel ASLR. In: CCS (2016)","DOI":"10.1145\/2976749.2978356"},{"key":"2_CR32","unstructured":"Gruss, D., Spreitzer, R., Mangard, S.: Cache template attacks: automating attacks on inclusive last-level caches. In: USENIX Security Symposium (2015)"},{"key":"2_CR33","unstructured":"halolinux: Page Cache Readahead (2022). https:\/\/www.halolinux.us\/kernel-architecture\/page-cache-readahead.html"},{"issue":"6","key":"2_CR34","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services, the case of deduplication in cloud storage. IEEE Secur. Privacy 8(6), 40\u201347 (2010)","journal-title":"IEEE Secur. Privacy"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Hund, R., Willems, C., Holz, T.: Practical timing side channel attacks against kernel space ASLR. In: S &P (2013)","DOI":"10.1109\/SP.2013.23"},{"key":"2_CR36","unstructured":"Moser, J.R.: Optimizing Linker Load Times (2006). https:\/\/lwn.net\/Articles\/192624\/"},{"key":"2_CR37","unstructured":"Corbet, J.: Fixing page-cache side channels, second attempt (2019). https:\/\/lwn.net\/Articles\/778437\/"},{"key":"2_CR38","unstructured":"Keelveedhi, S., Bellare, M., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: USENIX Security Symposium (2013)"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"2_CR40","unstructured":"Li, G., et al.: SCNet: A Neural Network for Automated Side-Channel Attack. arXiv:2008.00476 (2020)"},{"key":"2_CR41","unstructured":"Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., Mangard, S.: ARMageddon: cache attacks on mobile devices. In: USENIX Security Symposium (2016)"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Maurice, C., et al.: Hello from the other side: SSH over robust cache covert channels in the cloud. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23294"},{"key":"2_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-00306-6_2","volume-title":"Information Security Applications","author":"M Medwed","year":"2009","unstructured":"Medwed, M., Oswald, E.: Template attacks on ECDSA. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 14\u201327. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00306-6_2"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Moghimi, A., Irazoqui, G., Eisenbarth, T.: CacheZoom: how SGX amplifies the power of cache attacks. In: CHES (2017)","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"2_CR45","unstructured":"nxmnpg.lemoda: Manual Pages - LD.LLD (2022). https:\/\/nxmnpg.lemoda.net\/1\/ld.lld"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kemerlis, V.P., Sethumadhavan, S., Keromytis, A.D.: The spy in the sandbox: practical cache attacks in JavaScript and their implications. In: CCS (2015)","DOI":"10.1145\/2810103.2813708"},{"key":"2_CR47","unstructured":"Page, D.: A note on side-channels resulting from dynamic compilation. Cryptology ePrint archive, Report 2006\/349 (2006)"},{"key":"2_CR48","unstructured":"Rane, A., Lin, C., Tiwari, M.: Raccoon: closing digital side-channels through obfuscated execution. In: USENIX Security Symposium (2015)"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Rechberger, C., Oswald, E.: Practical template attacks. In: WISA (2004)","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"2_CR51","unstructured":"Ueyama, R.: lld: A Fast, Simple and Portable Linker (2017). https:\/\/llvm.org\/devmtg\/2017-10\/slides\/Ueyama-lld.pdf"},{"key":"2_CR52","volume-title":"Windows Internals","author":"ME Russinovich","year":"2012","unstructured":"Russinovich, M.E., Solomon, D.A., Ionescu, A.: Windows Internals. Pearson Education, London (2012)"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"Saileshwar, G., Fletcher, C.W., Qureshi, M.: Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion. In: ASPLOS (2021)","DOI":"10.1145\/3445814.3446742"},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lackner, F., Gruss, D.: JavaScript template attacks: automatically inferring host information for targeted exploits. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23155"},{"key":"2_CR55","unstructured":"Schwarz, M., Lipp, M., Canella, C.: misc0110\/PTEditor: a small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8 (2018). https:\/\/github.com\/misc0110\/PTEditor"},{"key":"2_CR56","doi-asserted-by":"crossref","unstructured":"Schwarz, M., et al.: KeyDrown: eliminating software-based keystroke timing side-channel attacks. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23027"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Schwarzl, M., Canella, C., Gruss, D., Schwarz, M.: Specfuscator: evaluating branch removal as a spectre mitigation. In: FC (2021)","DOI":"10.1007\/978-3-662-64322-8_14"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Schwarzl, M., Kraft, E., Lipp, M., Gruss, D.: Remote page deduplication attacks. In: NDSS (2022)","DOI":"10.14722\/ndss.2022.23081"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Shih, M.W., Lee, S., Kim, T., Peinado, M.: T-SGX: eradicating controlled-channel attacks against enclave programs. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23193"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Simon, L., Chisnall, D., Anderson, R.: What you get is what you C: controlling side effects in mainstream C compilers. In: EuroS &P (2018)","DOI":"10.1109\/EuroSP.2018.00009"},{"key":"2_CR61","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In: USENIX Security Symposium (2001)"},{"key":"2_CR62","unstructured":"statcounter Global Stats: Browser Market Share Worldwide (2022). https:\/\/gs.statcounter.com\/"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: EuroSys (2011)","DOI":"10.1145\/1972551.1972552"},{"key":"2_CR64","unstructured":"Van Bulck, J., Weichbrodt, N., Kapitza, R., Piessens, F., Strackx, R.: Telling your secrets without page faults: stealthy page table-based attacks on enclaved execution. In: USENIX Security Symposium (2017)"},{"issue":"1","key":"2_CR65","first-page":"35","volume":"17","author":"J Van Cleemput","year":"2017","unstructured":"Van Cleemput, J., De Sutter, B., De Bosschere, K.: Adaptive compiler strategies for mitigating timing side channel attacks. TDSC 17(1), 35\u201349 (2017)","journal-title":"TDSC"},{"key":"2_CR66","unstructured":"Van Schaik, S., Giuffrida, C., Bos, H., Razavi, K.: Malicious management unit: why stopping cache attacks in software is harder than you think. In: USENIX Security Symposium (2018)"},{"key":"2_CR67","unstructured":"Viswanathan, V.: Disclosure of Hardware Prefetcher Control on Some Intel Processors (2014). https:\/\/web.archive.org\/web\/20160304031330\/https:\/\/software.intel.com\/en-us\/articles\/disclosure-of-hw-prefetcher-control-on-some-intel-processors"},{"key":"2_CR68","doi-asserted-by":"crossref","unstructured":"Wajahat, A., Imran, A., Latif, J., Nazir, A., Bilal, A.: A novel approach of unprivileged keylogger detection. In: iCoMET (2019)","DOI":"10.1109\/ICOMET.2019.8673404"},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: Unveiling your keystrokes: a cache-based side-channel attack on graphics libraries. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23221"},{"key":"2_CR70","unstructured":"Wang, S., Wang, P., Liu, X., Zhang, D., Wu, D.: CacheD: identifying cache-based timing channels in production software. In: USENIX (2017)"},{"key":"2_CR71","unstructured":"Webnicer Ltd: chrome-downloads (2022). https:\/\/github.com\/webnicer\/chrome-downloads\/"},{"key":"2_CR72","doi-asserted-by":"crossref","unstructured":"Weiser, S., Spreitzer, R., Bodner, L.: Single trace attack against RSA key generation in intel SGX SSL. In: AsiaCCS (2018)","DOI":"10.1145\/3196494.3196524"},{"key":"2_CR73","doi-asserted-by":"crossref","unstructured":"Wichelmann, J., Moghimi, A., Eisenbarth, T., Sunar, B.: MicroWalk: a framework for finding side channels in binaries. In: ACSAC (2018)","DOI":"10.1145\/3274694.3274741"},{"key":"2_CR74","doi-asserted-by":"crossref","unstructured":"Wichelmann, J., Sieck, F., P\u00e4tschke, A., Eisenbarth, T.: Microwalk-ci: practical side-channel analysis for javascript applications. arXiv preprint arXiv:2208.14942 (2022)","DOI":"10.1145\/3548606.3560654"},{"key":"2_CR75","doi-asserted-by":"crossref","unstructured":"Xu, Y., Cui, W., Peinado, M.: Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: S &P (2015)","DOI":"10.1109\/SP.2015.45"},{"key":"2_CR76","doi-asserted-by":"crossref","unstructured":"Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., Schlichting, R.: An exploration of L2 cache covert channels in virtualized environments. In: CCSW (2011)","DOI":"10.1145\/2046660.2046670"},{"key":"2_CR77","unstructured":"Yarom, Y., Falkner, K.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security Symposium (2014)"},{"key":"2_CR78","unstructured":"Yuan, Y., Pang, Q., Wang, S.: Automated Side Channel Analysis of Media Software with Manifold Learning. arXiv preprint arXiv:2112.04947 (2021)"},{"key":"2_CR79","unstructured":"Zhang, K., Wang, X.: Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems. In: USENIX Security Symposium (2009)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33488-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T07:44:09Z","timestamp":1729496649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33488-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031334870","9783031334887"],"references-count":79,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33488-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2023\/committees.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"263","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}