{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:36:05Z","timestamp":1725726965517},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/dac18074.2021.9586183","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T18:30:34Z","timestamp":1636396234000},"page":"973-978","source":"Crossref","is-referenced-by-count":1,"title":["SeMPE: Secure Multi Path Execution Architecture for Removing Conditional Branch Side Channels"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Mondelli","sequence":"first","affiliation":[]},{"given":"Paul","family":"Gazzillo","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Solihin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"64 and IA-32 Architectures Software Developer's Manual","year":"2016","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IMSNA.2013.6743403"},{"journal-title":"The gem5 simulator Version 20 0+","year":"2020","author":"lowe-power","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892230"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.12"},{"journal-title":"Coding rules","year":"0","key":"ref10"},{"journal-title":"Why not use &#x2018;&#x2019; or &#x2018;==&#x2019; in constant time comparison?","year":"0","key":"ref11"},{"journal-title":"Why constant-time crypto?","year":"0","author":"pornin","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref18","article-title":"Raccoon: Closing Digital Side-Channels through Obfuscated Execution","author":"rane","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"journal-title":"Selective Dual Path Execution","year":"1996","author":"heil","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2005.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2200\/S00309ED1V01Y201011CAC012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"journal-title":"868948 - a patch for NSS a constant-time implementation of the GHASH function of AES-GCM for processors that do not have the AES-NI\/PCLMULQDQ","year":"0","key":"ref6"},{"journal-title":"Software Optimization Guide for AMD Family 17h Models","year":"0","key":"ref29"},{"journal-title":"Path O-RAM An Extremely Simple Oblivious RAM Protocol","year":"2012","author":"stefanov","key":"ref5"},{"journal-title":"AES timing attack countermeasures","year":"0","key":"ref8"},{"journal-title":"Added more constant-time code \/ removed biases in the prime number generation routines","year":"0","key":"ref7"},{"key":"ref2","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"26th USENIX Security Symposium"},{"journal-title":"BearSSL","year":"0","key":"ref9"},{"key":"ref1","article-title":"On the power of simple branch prediction analysis","author":"aciicmez","year":"2007","journal-title":"Symposium on Information Computer and Communication Security ser AsiaCCS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514223"},{"journal-title":"Libjpeg Library","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1998.694778"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314605"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.24"},{"key":"ref26","article-title":"Meltdown: Reading Kernel Memory from User Space","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"}],"event":{"name":"2021 58th ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2021,12,5]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 58th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9585997\/9586083\/09586183.pdf?arnumber=9586183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:51Z","timestamp":1652187351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9586183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/dac18074.2021.9586183","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}