{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:57Z","timestamp":1772725617172,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":56,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_14","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T22:17:23Z","timestamp":1634941043000},"page":"293-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Specfuscator: Evaluating Branch Removal as a Spectre Mitigation"],"prefix":"10.1007","author":[{"given":"Martin","family":"Schwarzl","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Canella","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"14_CR1","unstructured":"Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism (2018). https:\/\/developer.arm.com\/support\/arm-security-updates\/speculative-processor-vulnerability"},{"key":"14_CR2","unstructured":"x86\/cpu\/AMD: Make LFENCE a serializing instruction (2018). https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/?id=e4d0e84e490790798691aaa0f2e598637f1867ec"},{"key":"14_CR3","unstructured":"Advanced Micro Devices Inc.: Software Techniques for Managing Speculation on AMD Processors (2018). Accessed 7 Oct 2018"},{"key":"14_CR4","unstructured":"Amit, N., Jacobs, F., Wei, M.: Jumpswitches: restoring the performance of indirect branches in the era of spectre. In: USENIX ATC (2019)"},{"key":"14_CR5","unstructured":"ARM: Cache Speculation Side-channels (2018). version 2.4"},{"key":"14_CR6","unstructured":"ARM: Straight-line Speculation (2020). version 1.0"},{"key":"14_CR7","unstructured":"Bernstein, D.J.: Cache-Timing Attacks on AES (2005). http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"14_CR8","unstructured":"Bhattacharya, S., Maurice, C.M.T.N., Bhasin, S., Mukhopadhyay, D.: Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls. Cryptology ePrint Archive, Report 2017\/968 (2017)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, A., et al.: SMoTherSpectre: exploiting speculative execution through port contention. In: CCS (2019)","DOI":"10.1145\/3319535.3363194"},{"key":"14_CR10","unstructured":"Branco, R., Hu, K., Sun, K., Kawakami, H.: Efficient mitigation of side-channel based attacks against speculative execution processing architectures (2019). uS Patent App. 16\/023,564"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Canella, C., Pudukotai Dinakarrao, S.M., Gruss, D., Khasawneh, K.N.: Evolution of defenses against transient-execution attacks. In: GLSVLSI (2020)","DOI":"10.1145\/3386263.3407584"},{"key":"14_CR12","unstructured":"Canella, C., et al.: A systematic evaluation of transient execution attacks and defenses. In: USENIX Security Symposium (2019). Extended classification tree and PoCs at https:\/\/transient.fail\/"},{"key":"14_CR13","unstructured":"Carruth, C.: RFC: Speculative Load Hardening (a Spectre variant #1 mitigation) (2018)"},{"key":"14_CR14","unstructured":"Domas, C.: M\/o\/Vfuscator (2015). https:\/\/github.com\/xoreaxeaxeax\/movfuscator"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: CHES (1999)","DOI":"10.1007\/3-540-48059-5_25"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Evtyushkin, D., Ponomarev, D., Abu-Ghazaleh, N.: Jump over aslr: attacking branch predictors to bypass aslr. In: MICRO (2016)","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"14_CR17","unstructured":"Fog, A.: The microarchitecture of Intel. An optimization guide for assembly programmers and compiler makers, AMD and VIA CPUs (2016)"},{"key":"14_CR18","unstructured":"Fraser, C.W., Hanson, D.R.: A retargetable C compiler: design and implementation (1995)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Fustos, J., Farshchi, F., Yun, H.: SpectreGuard: an efficient data-centric defense mechanism against spectre attacks. In: DAC (2019)","DOI":"10.1145\/3316781.3317914"},{"key":"14_CR20","unstructured":"Horn, J.: speculative execution, variant 4: speculative store bypass (2018)"},{"key":"14_CR21","unstructured":"Intel: Intel Analysis of Speculative Execution Side Channels (2018). revision 4.0"},{"key":"14_CR22","unstructured":"Intel: Retpoline: A Branch Target Injection Mitigation (2018). revision 003"},{"key":"14_CR23","unstructured":"Intel: Speculative Execution Side Channel Mitigations (2018). revision 3.0"},{"key":"14_CR24","unstructured":"Intel: Intel 64 and IA-32 Architectures Optimization Reference Manual (2019)"},{"key":"14_CR25","unstructured":"Intel: Avoiding the Cost of Branch Misprediction (2020). https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/avoiding-the-cost-of-branch-misprediction.html"},{"key":"14_CR26","unstructured":"Fetiveau, J.: Circumventing Chrome Typer Bugs (2020). https:\/\/doar-e.github.io\/blog\/2019\/05\/09\/circumventing-chromes-hardening-of-typer-bugs\/"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Khasawneh, K.N., Koruyeh, E.M., Song, C., Evtyushkin, D., Ponomarev, D., Abu-Ghazaleh, N.: SafeSpec: banishing the spectre of a meltdown with leakage-free speculation. In: DAC (2019)","DOI":"10.1145\/3316781.3317903"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Kiriansky, V., Lebedev, I., Amarasinghe, S., Devadas, S., Emer, J.: DAWG: a defense against cache timing attacks in speculative execution processors. In: MICRO (2018)","DOI":"10.1109\/MICRO.2018.00083"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Kirsch, J., Jonischkeit, C., Kittel, T., Zarras, A., Eckert, C.: Combating control flow linearization. In: 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) (2017). https:\/\/www.sec.in.tum.de\/i20\/publications\/combating-control-flow-linearization\/@@download\/file\/CFL.pdf","DOI":"10.1007\/978-3-319-58469-0_26"},{"key":"14_CR30","unstructured":"Kocher, P.: Spectre Mitigations in Microsoft\u2019s C\/C++ Compiler (2018)"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: S&P (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"14_CR32","unstructured":"Koruyeh, E.M., Khasawneh, K., Song, C., Abu-Ghazaleh, N.: Spectre Returns! WOOT, Speculation Attacks using the Return Stack Buffer. In (2018)"},{"key":"14_CR33","unstructured":"Lee, S., Shih, M., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In: USENIX Security Symposium (2017)"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Maisuradze, G., Rossow, C.: ret2spec: speculative execution using return stack buffers. In: CCS (2018)","DOI":"10.1145\/3243734.3243761"},{"key":"14_CR35","unstructured":"Microsoft: Mitigating speculative execution side-channel attacks in Microsoft Edge and Internet Explorer (2018)"},{"key":"14_CR36","unstructured":"Miller, M.: Mitigating speculative execution side channel hardware vulnerabilities (2018)"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Moll, S., Hack, S.: Partial control-flow linearization. In: Proceedings of the 39th Conference on Programming Language Design and Implementation, pp. 543\u2013556. ACM (2018)","DOI":"10.1145\/3192366.3192413"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Molnar, D., Piotrowski, M., Schultz, D., Wagner, D.: The program counter security model: automatic detection and removal of control-flow side channel attacks. In: International Conference on Information Security and Cryptology (2005)","DOI":"10.1007\/11734727_14"},{"key":"14_CR39","unstructured":"Oleksenko, O., Trach, B., Reiher, T., Silberstein, M., Fetzer, C.: You shall not bypass: employing data dependencies to prevent Bounds Check Bypass (2018). arXiv:1805.08506"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Palit, T., Monrose, F., Polychronakis, M.: Mitigating data leakage by protecting memory-resident sensitive data. In: ACSAC (2019)","DOI":"10.1145\/3359789.3359815"},{"key":"14_CR41","unstructured":"Pardoe, A.: Spectre mitigations in MSVC (2018)"},{"key":"14_CR42","unstructured":"Pizlo, F.: What Spectre and Meltdown mean for WebKit (2018)"},{"key":"14_CR43","unstructured":"Reis, C., Moshchuk, A., Oskov, N.: Site isolation: process separation for web sites within the browser. In: USENIX Security Symposium (2019)"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Lipp, M., Canella, C., Schilling, R., Kargl, F., Gruss, D.: ConTExT: a generic approach for mitigating spectre. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24271"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Schwarzl, M., Lipp, M., Gruss, D.: NetSpectre: read arbitrary memory over network. In: ESORICS (2019)","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"14_CR46","unstructured":"Schwarzl, M., Schwarz, M., Schuster, T., Gruss, D.: It\u2019s not prefetch: speculative dereferencing of registers (2020). (in submission)"},{"key":"14_CR47","unstructured":"Sense Post: v8 - Documentation (2020). https:\/\/sensepost.com\/blog\/2020\/intro-to-chromes-v8-from-an-exploit-development-angle\/"},{"key":"14_CR48","unstructured":"Dolan, S.: MOV is Turing-complete (2013). https:\/\/drwho.virtadpt.net\/files\/mov.pdf"},{"key":"14_CR49","unstructured":"The Chromium Projects: Actions required to mitigate Speculative Side-Channel Attack techniques (2018)"},{"key":"14_CR50","unstructured":"Turner, P.: Retpoline: a software construct for preventing branch-target-injection (2018). https:\/\/support.google.com\/faqs\/answer\/7625886"},{"key":"14_CR51","unstructured":"Wagner, L.: Mitigations landing for new class of timing attack (2018)"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Weisse, O., Neal, I., Loughlin, K., Wenisch, T.F., Kasikci, B.: NDA: preventing speculative execution attacks at their source. In: MICRO (2019)","DOI":"10.1145\/3352460.3358306"},{"key":"14_CR53","doi-asserted-by":"crossref","unstructured":"Yan, M., Choi, J., Skarlatos, D., Morrison, A., Fletcher, C.W., Torrellas, J.: InvisiSpec: making speculative execution invisible in the cache hierarchy. In: MICRO (2018)","DOI":"10.1145\/3352460.3361129"},{"key":"14_CR54","unstructured":"Yarom, Y., Falkner, K.: Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security Symposium (2014)"},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"Yu, J., Hsiung, L., El Hajj, M., Fletcher, C.W.: Data oblivious ISA extensions for side channel-resistant and high performance computing. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23061"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Yu, J., Yan, M., Khyzha, A., Morrison, A., Torrellas, J., Fletcher, C.W.: Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data. In: MICRO (2019)","DOI":"10.1145\/3352460.3358274"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:03:30Z","timestamp":1725984210000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}