{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:53:06Z","timestamp":1757623986732,"version":"3.44.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Shanghai Pujiang Program","award":["21PJD026"],"award-info":[{"award-number":["21PJD026"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07691-z","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T15:47:20Z","timestamp":1755791240000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GAN-assisted data augmentation to enhance detection accuracy of Evasive Spectre attacks"],"prefix":"10.1007","volume":"81","author":[{"given":"Jiajia","family":"Jiao","sequence":"first","affiliation":[]},{"given":"Ling","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"issue":"7","key":"7691_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/3399742","volume":"63","author":"P Kocher","year":"2020","unstructured":"Kocher P, Horn J, Fogh A, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T et al (2020) Spectre attacks: exploiting speculative execution. Commun ACM 63(7):93\u2013101","journal-title":"Commun ACM"},{"key":"7691_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13204090","author":"jiajia Jiao","year":"2024","unstructured":"Jiajia Jiao, Ran Wen, and Yulian Li. T-Smade (2024) A Two-Stage Smart Detector for Evasive Spectre Attacks Under Various Workloads. Electronics, 13(20):4090. https:\/\/doi.org\/10.3390\/electronics13204090","journal-title":"Electronics"},{"key":"7691_CR3","unstructured":"Oleksenko O, Trach B, Silberstein M, Fetzer C (2019) Spec- Fuzz: Bringing Spectre-type vulnerabilities to the surface. arxiv:1905.10311"},{"key":"7691_CR4","doi-asserted-by":"crossref","unstructured":"Qi Z, Qian F, Cheng Y, Yan M, Peng L, Yin H, Tao W (2021) SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. In NDSS, pages 1\u201314","DOI":"10.14722\/ndss.2021.24466"},{"key":"7691_CR5","doi-asserted-by":"publisher","unstructured":"Gulmezoglu MC, Sunar B, Yurtseven K, Gulmezoglu B (2021) FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. In IEEE European Symposium on Security and Privacy (EuroS&P), pages 616\u2013632. IEEE, 2021. https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00047","DOI":"10.1109\/EuroSP51992.2021.00047"},{"key":"7691_CR6","doi-asserted-by":"publisher","unstructured":"Biringa C, Baye G, Kul G (2023) Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks. In Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, pages 53\u201357. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3569562.3569589","DOI":"10.1145\/3569562.3569589"},{"key":"7691_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3082471","author":"C Li","year":"2021","unstructured":"Li C,  Gaudiot JL (2021) Detecting Spectre attacks using hardware performance counters. IEEE Trans Comput 71(5):1320\u20131331. https:\/\/doi.org\/10.1109\/TC.2021.3082471","journal-title":"IEEE Trans Comput"},{"key":"7691_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3149743","author":"Abraham Peedikayil Kuruvila","year":"2022","unstructured":"Kuruvila AP, Meng X, Kundu S, Pandey G,  Basu K (2022) Explainable machine learning for intrusion detection via hardware performance counters. IEEE Trans Comput Aided Design of Integrated Cir Syst 41(11):4952\u20134964. https:\/\/doi.org\/10.1109\/TCAD.2022.3149743","journal-title":"IEEE Trans Comput Aided Design of Integrated Cir Syst"},{"key":"7691_CR9","doi-asserted-by":"publisher","unstructured":"Mai AL,  Weissenbacher G (2024) Statistical Profiling of Micro-Architectural Traces and Machine Learning for Spectre Detection: A Systematic Evaluation. In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1\u20136. IEEE. https:\/\/doi.org\/10.23919\/DATE58400.2024.10546539","DOI":"10.23919\/DATE58400.2024.10546539"},{"key":"7691_CR10","doi-asserted-by":"publisher","unstructured":"Pan Z, Sheldon J, Sudusinghe C, Charles S, Mishra P (2021) Hardware-assisted malware detection using machine learning. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1775\u20131780. IEEE, 2021. https:\/\/doi.org\/10.23919\/DATE51398.2021.9474050","DOI":"10.23919\/DATE51398.2021.9474050"},{"key":"7691_CR11","doi-asserted-by":"publisher","unstructured":"Koc MK, Altilar DT (2023) Selection of best fit hardware performance counters to detect cache side-channel attacks. In Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pages 17\u201322. Association for Computing Machinery, New York, NY, USA, 2023. https:\/\/doi.org\/10.1145\/3579988.3585052","DOI":"10.1145\/3579988.3585052"},{"key":"7691_CR12","doi-asserted-by":"publisher","unstructured":"Hu Y, Liang S, Li M, Xue T, Zhang B, Yu W (2022) CARE: Enabling hardware performance counter based malware detection resilient to system resource competition. In 2022 IEEE 24th Int Conf on High Performance Computing & Communications, pages 586\u2013594. IEEE, 2022. https:\/\/doi.org\/10.1109\/HPCCDSS-SmartCity-DependSys57074.2022.00105","DOI":"10.1109\/HPCCDSS-SmartCity-DependSys57074.2022.00105"},{"key":"7691_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.2976069","author":"C Li","year":"2020","unstructured":"Li C,  Gaudiot JL (2020) Challenges in detecting an \u2019Evasive Spectre\u2019. IEEE Comput Arch Lett 19(1):18\u201321. https:\/\/doi.org\/10.1109\/LCA.2020.2976069","journal-title":"IEEE Comput Arch Lett"},{"key":"7691_CR14","doi-asserted-by":"publisher","unstructured":"Kosasih W, Feng Y, Chuengsatiansup C, Yarom Y, Zhu Z (2024) Sok: Can we really detect cache side-channel attacks by monitoring performance counters? In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pages 172\u2013185. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3634737.3637649","DOI":"10.1145\/3634737.3637649"},{"key":"7691_CR15","doi-asserted-by":"publisher","unstructured":"He Z, Hu G, Lee RB (2023) Cloudshield: real-time anomaly detection in the cloud. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, pages 91\u2013102. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3577923.3583639","DOI":"10.1145\/3577923.3583639"},{"key":"7691_CR16","unstructured":"Wiebing S, de Faveri Tron A, Bos H, Giuffrida C (2024) InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2. In 33rd USENIX Security Symposium (USENIX Security 24), pages 577\u2013594. USENIX Association, Philadelphia, PA"},{"key":"7691_CR17","doi-asserted-by":"publisher","unstructured":"Pashrashid A, Hajiabadi A, Carlson TE (2022) Fast, Robust and Accurate Detection of Cache-based Spectre Attack Phases. In 2022 IEEE\/ACM International Conference On Computer Aided Design (ICCAD), pages 1\u20139. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3508352.3549330","DOI":"10.1145\/3508352.3549330"},{"issue":"6","key":"7691_CR18","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt F (1958) The perceptron: a probabilistic model for information storage and organization in the brain. Psychol Rev 65(6):386\u2013408","journal-title":"Psychol Rev"},{"key":"7691_CR19","doi-asserted-by":"publisher","unstructured":"Kosasih W, Feng Y, Chuengsatiansup C,  Yarom Y, Zhu Z (2024) Sok: Can we really detect cache side-channel attacks by monitoring performance counters? In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pages 172\u2013185. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3634737.3637649.","DOI":"10.1145\/3634737.3637649"},{"key":"7691_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970","author":"J Demme","year":"2013","unstructured":"Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S,  Stolfo S (2013) On the feasibility of online malware detection with performance counters. SIGARCH Comput Arch News 41(3):559\u2013570. https:\/\/doi.org\/10.1145\/2508148.2485970","journal-title":"SIGARCH Comput Arch News"},{"key":"7691_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-16","volume-title":"Intrusions and Defenses","author":"A Tang","year":"2014","unstructured":"Tang A, Sethumadhavan S, Stolfo SJ (2014) Unsupervised anomaly-based malware detection using hardware features. In Angelos Stavrou, Herbert Bos, and Georgios Portokalidis, editors, Research in Attacks, Intrusions and Defenses, pages 109\u2013129. Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978-3-319-11379-16"},{"key":"7691_CR22","doi-asserted-by":"crossref","unstructured":"Khasawneh KN, Ozsoy M, Donovick C, Abu-Ghazaleh N, Ponomarev D (2015) Ensemble learning for low-level hardware-supported malware detection. In International Symposium on Recent Advances in Intrusion Detection, pages 3\u201325. Springer-Verlag, Berlin, Heidelberg","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"7691_CR23","first-page":"564","volume":"2017","author":"Manaar Alam","year":"2017","unstructured":"Alam M, Bhattacharya S, Mukhopadhyay D, Bhattacharya S (2017) Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks. IACR Cryptology ePrint Archive, 2017:564","journal-title":"IACR Cryptology ePrint Archive"},{"key":"7691_CR24","doi-asserted-by":"publisher","DOI":"10.1145\/3422622","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D,  Ozair S, Courville A,  Bengio Y (2020) Generative adversarial networks. Commun ACM, 63(11):139\u2013144. https:\/\/doi.org\/10.1145\/3422622","journal-title":"Commun ACM"},{"key":"7691_CR25","doi-asserted-by":"publisher","unstructured":"Saxena D,  Cao J, Xu J, Kulshrestha T (2024) RG-GAN: Dynamic Regenerative Pruning for Data-Efficient Generative Adversarial Networks. Proceedings of the AAAI Conference on Artificial Intelligence, 38:4704\u2013 4712. https:\/\/doi.org\/10.1609\/aaai.v38i5.28271","DOI":"10.1609\/aaai.v38i5.28271"},{"key":"7691_CR26","doi-asserted-by":"publisher","unstructured":"Liu F, Yarom Y, Ge Q, Heiser G, Lee RB (2015) Last-Level Cache Side-Channel Attacks are Practical. In 2015 IEEE Symposium on Security and Privacy, pages 605\u2013622. https:\/\/doi.org\/10.1109\/SP.2015.43","DOI":"10.1109\/SP.2015.43"},{"key":"7691_CR27","unstructured":"Nam H, Pothukuchi RP, Li B, Kim NS, Torrellas J (2023) Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation"},{"key":"7691_CR28","doi-asserted-by":"publisher","unstructured":"Pan Z, Mishra P (2021) Automated Detection of Spectre and Meltdown Attacks Using Explainable Machine Learning. In 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 24\u201334. https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00047","DOI":"10.1109\/EuroSP51992.2021.00047"},{"key":"7691_CR29","unstructured":"Canella C, Van Bulck J, Schwarz M, Lipp M, von Berg B, P Ortner, Piessens F, Evtyushkin D, Gruss D (2019) A Systematic Evaluation of Transient Execution Attacks and Defenses. In 28th USENIX Security Symposium (USENIX Security 19),pages 249\u2013266.USENIX Association, Santa Clara, CA"},{"key":"7691_CR30","doi-asserted-by":"crossref","unstructured":"He X, Li Y (2022) A Detecting Method Against Cross-Container Spectre Attacks. In 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), pages 1531\u20131538, Hainan, China","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00235"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07691-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07691-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07691-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T10:21:33Z","timestamp":1757413293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07691-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":30,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["7691"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07691-z","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"17 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"1263"}}