{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:21Z","timestamp":1767340281455,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,27]]},"DOI":"10.1109\/cgo51591.2021.9370305","type":"proceedings-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T21:33:26Z","timestamp":1615498406000},"page":"200-210","source":"Crossref","is-referenced-by-count":10,"title":["Memory-Safe Elimination of Side Channels"],"prefix":"10.1109","author":[{"given":"Luigi","family":"Soares","sequence":"first","affiliation":[]},{"given":"Fernando Magno Quintan","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"431","article-title":"Raccoon: Closing digital side-channels through obfuscated execution","author":"rane","year":"2015","journal-title":"Sec"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/325694.325702"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2086696.2086702"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3287624.3287694"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TDSC.2017.2729549"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-030-25540-4_8"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TCAD.2018.2858402"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SP40000.2020.00028"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2892208.2892230"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3288758"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1002\/stvr.1718"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/75277.75280"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/3-540-44499-8_8"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/CGO.2019.8661178"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref6","first-page":"53","article-title":"Verifying constant-time implementations","author":"almeida","year":"2016","journal-title":"Proceedings of the 25th USENIX Conference on Security Symposium ser SEC'16"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1538788.1538814"},{"key":"ref5","first-page":"1701","article-title":"Dude, is my code constant time?","author":"reparaz","year":"2017","journal-title":"DATE"},{"key":"ref8","article-title":"Formal verification of a constant-time preserving C compiler","volume":"4","author":"barthe","year":"2019","journal-title":"Proc ACM Program Lang"},{"key":"ref7","first-page":"710","article-title":"Verifying and synthesizing constant-resource implementations with types","author":"ngo","year":"2017","journal-title":"Security and Privacy"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-642-23822-2_20"},{"year":"2020","author":"guarnieri","journal-title":"Hardware-software contracts for secure speculation","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/10721064_15"},{"key":"ref20","first-page":"15","article-title":"Eliminating timing side-channel leaks using program repair","author":"wu","year":"2018","journal-title":"ISSTA"},{"key":"ref22","first-page":"505","article-title":"CaSym: Cache aware symbolic execution for side channel detection and mitigation","author":"brotzman","year":"2019","journal-title":"Security & Privacy"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2024716.2024718"},{"year":"2018","author":"wu","journal-title":"[ISSTA '18 Artifact Evaluation] Eliminating Timing Side-Channel Leaks using Program Repair","key":"ref24"},{"key":"ref23","first-page":"716","article-title":"Benchmarking tools for verification of constant-time execution","author":"lopes","year":"2017","journal-title":"SBSE"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.scico.2017.10.014"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2854038.2854050"}],"event":{"name":"2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2021,2,27]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2021,3,3]]}},"container-title":["2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370300\/9370301\/09370305.pdf?arnumber=9370305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:50Z","timestamp":1652197370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cgo51591.2021.9370305","relation":{},"subject":[],"published":{"date-parts":[[2021,2,27]]}}}