{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:54:16Z","timestamp":1772150056212,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/cahpc.2018.8645918","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:19:26Z","timestamp":1550791166000},"page":"25-28","source":"Crossref","is-referenced-by-count":26,"title":["Online Detection of Spectre Attacks Using Microarchitectural Traces from Performance Counters"],"prefix":"10.1109","author":[{"given":"Congmiao","family":"Li","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Gaudiot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kocher","year":"2018","journal-title":"Spectre Attacks Exploiting Speculative Execution"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-319-62105-0_11","article-title":"KASLR is dead: long live KASLR","author":"gruss","year":"2017","journal-title":"International Symposium on Engineering Secure Software and Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref13","article-title":"Machine learning and intrusion detection: Current and future directions","author":"frank","year":"1994","journal-title":"Proc National 17th Computer Security Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40095-014-0105-5"},{"key":"ref15","author":"horn","year":"2018","journal-title":"speculative execution variant 4 speculative store bypass"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref3","first-page":"719","article-title":"FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"Usenix Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77272-9_12"},{"key":"ref8","first-page":"557","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"ref2","author":"bernstein","year":"2005","journal-title":"Cache-timing attacks on AES"},{"key":"ref1","article-title":"Cache attacks and Countermeasures: the Case of AES","author":"osvik","year":"2005","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref9","author":"horn","year":"2018","journal-title":"Reading privileged memory with a side-channel"}],"event":{"name":"2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD)","location":"Lyon, France","start":{"date-parts":[[2018,9,24]]},"end":{"date-parts":[[2018,9,27]]}},"container-title":["2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8638685\/8645847\/08645918.pdf?arnumber=8645918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:08:36Z","timestamp":1643267316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8645918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cahpc.2018.8645918","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}