{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:47:02Z","timestamp":1772725622910,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11132915","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["HoBBy: Hardening Unbalanced Branches against Control Flow Attacks on Intel SGX and AMD SEV"],"prefix":"10.1109","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University,Beijing,China"}]},{"given":"Shuaihu","family":"Feng","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory,Beijing,China"}]},{"given":"Yuan","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,Beijing,China"}]},{"given":"Dongsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Beijing,China"}]},{"given":"Trevor E.","family":"Carlson","sequence":"additional","affiliation":[{"name":"National University of Singapore,Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23513"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00066"},{"key":"ref3","article-title":"AMD64 Architecture Programmer\u2019s Manual Volume 2: System Programming","year":"2024"},{"key":"ref4","article-title":"Software Grand Exposure: SGX Cache Attacks Are Practical","volume-title":"USENIX Workshop on Offensive Technologies (WOOT)","author":"Brasser"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575719"},{"key":"ref6","first-page":"4051","article-title":"AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Constable"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2009.19"},{"key":"ref8","first-page":"6843","article-title":"CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Deng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179368"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref11","first-page":"955","article-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Gras"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94496-8_4"},{"key":"ref13","first-page":"299","article-title":"High-Resolution Side Channels for Untrusted Operating Systems","volume-title":"USENIX Annual Technical Conference (USENIX ATC)","author":"H\u00c3\u00a4hnel"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3655895"},{"key":"ref15","article-title":"Guidelines for Mitigating Timing Side Channels Against Cryptographic Implementations"},{"key":"ref16","article-title":"Intel\u00c2\u00ae 64 and IA-32 Architectures Software Developer Manuals","year":"2024"},{"key":"ref17","first-page":"557","article-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing","volume-title":"USENIX Security Symposium","author":"Lee"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg350"},{"key":"ref19","article-title":"libjpeg version 9f","year":"2024"},{"key":"ref21","article-title":"llvm-project","year":"2024"},{"key":"ref22","article-title":"Mbedtls version 2.6.1","year":"2017"},{"key":"ref23","article-title":"Mbedtls version 3.6.1","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref25","first-page":"469","article-title":"CopyCat: Controlled InstructionLevel Attacks on Enclaves","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Moghimi"},{"key":"ref26","first-page":"663","article-title":"Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Puddu"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2993896"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"ref30","first-page":"318","article-title":"MicroScope: enabling microarchitectural replay attacks","volume-title":"Annual International Symposium on Computer Architecture (ISCA)","author":"Skarlatos"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"ref33","first-page":"1041","article-title":"Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution","volume-title":"USENIX Security Symposium","author":"Van Bulck"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"ref35","first-page":"679","article-title":"Hertzbleed: Turning Power SideChannel Attacks Into Remote Timing Attacks on x86","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Wang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00261"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i1.180-206"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00050"},{"key":"ref39","article-title":"wolfssl version 5.7.2-stable","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0152-y"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3620666.3651382"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589100"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378487"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00039"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11132915.pdf?arnumber=11132915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T05:24:41Z","timestamp":1758000281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11132915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11132915","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}