{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:30:11Z","timestamp":1773246611940,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/dac18072.2020.9218572","type":"proceedings-article","created":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T19:57:03Z","timestamp":1602273423000},"page":"1-6","source":"Crossref","is-referenced-by-count":31,"title":["A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors"],"prefix":"10.1109","author":[{"given":"Mohammad Rahmani","family":"Fadiheh","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Muller","sequence":"additional","affiliation":[]},{"given":"Raik","family":"Brinkmann","sequence":"additional","affiliation":[]},{"given":"Subhasish","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Stoffel","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Kunz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Spectre attacks: Exploiting speculative execution","author":"Kocher","year":"2018","journal-title":"arXiv preprint arXiv:1801.01203"},{"key":"ref2","article-title":"Meltdown","author":"Lipp","year":"2018","journal-title":"arXiv preprint arXiv:1801.01207"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"ref5","article-title":"Towards constant-time foundations for the new spectre era","author":"Cauligi","year":"2019","journal-title":"arXiv preprint arXiv:1910.01755"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00027"},{"key":"ref7","article-title":"SPECTECTOR: Principled detection of speculative information flows","author":"Guarnieri","year":"2018","journal-title":"arXiv preprint arXiv:1812.08639"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358314"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16458-4_27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2713393"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7873\/DATE2014.326"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715004"},{"key":"ref15","article-title":"BOOMv2: an open-source out-of-order RISC-V core","volume-title":"First Workshop on Computer Architecture Research with RISC-V (CARRV)","author":"Celio"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398927"}],"event":{"name":"2020 57th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2020,7,20]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 57th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211868\/9218488\/09218572.pdf?arnumber=9218572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:56:08Z","timestamp":1706057768000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9218572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dac18072.2020.9218572","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}