{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:27:40Z","timestamp":1743049660738,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_30","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"511-520","source":"Crossref","is-referenced-by-count":1,"title":["Attacks on Branch Predictors: An Empirical Exploration"],"prefix":"10.1007","author":[{"given":"Moumita","family":"Das","sequence":"first","affiliation":[]},{"given":"Bhaskar","family":"Sardar","sequence":"additional","affiliation":[]},{"given":"Ansuman","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-540-77026-8_30","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"S Burman","year":"2007","unstructured":"Burman, S., Mukhopadhyay, D., Veezhinathan, K.: LFSR based stream ciphers are vulnerable to power attacks. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 384\u2013392. Springer, Heidelberg (2007)"},{"key":"30_CR2","unstructured":"Fog, A.: The microarchitecture of Intel, AMD and VIA CPUs (2011)"},{"issue":"2\/3","key":"30_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J Kelsey","year":"2000","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8(2\/3), 141\u2013158 (2000)","journal-title":"J. Comput. Secur."},{"key":"30_CR4","first-page":"1","volume":"5","author":"GH Loh","year":"2003","unstructured":"Loh, G.H., Henry, D.S., Krishnamurthy, A.: Exploiting bias in the hysteresis bit of 2-bit saturating counters in branch predictors. J. Instr.-Level Parallelism 5, 1\u201332 (2003)","journal-title":"J. Instr.-Level Parallelism"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Malhotra, G., Aggarwal, P., Sagar, A., Sarangi, S.R.: ParTejas: a parallel simulator for multicore processors. In: ISPASS (2014)","DOI":"10.1109\/ISPASS.2014.6844470"},{"key":"30_CR6","unstructured":"McFarling, S.: Combining branch predictors (1993)"},{"issue":"9","key":"30_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/143371.143490","volume":"27","author":"S-T Pan","year":"1992","unstructured":"Pan, S.-T., So, K., Rahmeh, J.T.: Improving the accuracy of dynamic branch prediction using branch correlation. ACM Sigplan Not. 27(9), 76\u201384 (1992)","journal-title":"ACM Sigplan Not."},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Seznec, A.: Analysis of the O-GEometric history length branch predictor. In: ISCA, pp. 394\u2013405 (2005)","DOI":"10.1145\/1080695.1070003"},{"key":"30_CR9","first-page":"1","volume":"8","author":"A Seznec","year":"2006","unstructured":"Seznec, A., Michaud, P.: A case for (partially) tagged geometric history length branch prediction. J. Instr. Level Parallelism 8, 1\u201323 (2006)","journal-title":"J. Instr. Level Parallelism"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Yeh, T.-Y., Patt, Y.N.: Two-level adaptive training branch prediction. In: MICRO, pp. 51\u201361 (1991)","DOI":"10.1145\/123465.123475"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Yeh, T.-Y., Patt, Y.N.: Alternative implementations of two-level adaptive branch prediction. In: SIGARCH, vol. 20(2), pp. 124\u2013134 (1992)","DOI":"10.1145\/146628.139709"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:04:08Z","timestamp":1559333048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}