{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T11:09:37Z","timestamp":1745579377633,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2212010z,SaTC-1929300,IUCRC-1916762"],"award-info":[{"award-number":["CNS-2212010z,SaTC-1929300,IUCRC-1916762"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545376","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"01-11","source":"Crossref","is-referenced-by-count":1,"title":["TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack"],"prefix":"10.1109","author":[{"given":"Tianhong","family":"Xu","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Aidong Adam","family":"Ding","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Yunsi","family":"Fei","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"263","reference":[{"volume-title":"Arms cortex-a53: Tiny but important","year":"2023","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-540-77272-9_12"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/11967668_15"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/FDTC.2007.10"},{"volume-title":"Arm\u00ae Cortex\u00ae-A53 MPCore Processor","author":"Arm","key":"ref5"},{"volume-title":"Cortex-a53","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-030-56877-1_7"},{"key":"ref8","article-title":"Sgxpectre attacks: Stealing intel secrets from sgx enclaves via speculative execution","author":"Chen","year":"2018","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3052973.3053007"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3274694.3274704"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MICRO.2001.991117"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3296957.3173204"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3065913.3065915"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.46586\/tches.v2020.i1.321-347"},{"key":"ref15","first-page":"1345","article-title":"High accuracy and high fidelity extraction of neural networks","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium","author":"Jagielski","year":"2020"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/DAC18074.2021.9586226"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-030-10970-7_11"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/s22197354"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3472634.3472652"},{"volume-title":"mbedtls","key":"ref20"},{"volume-title":"optee","key":"ref21"},{"key":"ref22","article-title":"Dynamically sizing the tage branch predictor","volume-title":"5th JILP Workshop on Computer Architecture Competitions (JWAC-5): Championship Branch Prediction (CBP-5)","author":"Pruett","year":"2016"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3319535.3354197"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref25","first-page":"1","article-title":"A 256 kbits I-tage branch predictor","volume":"9","author":"Seznec","year":"2007","journal-title":"Journal of Instruction-Level Parallelism (JILP) Special Issue: The Second Championship Branch Prediction Competition (CBP-2)"},{"key":"ref26","article-title":"Tage-sc-l branch predictors","author":"Seznec","year":"2014","journal-title":"JILP-Championship Branch Prediction"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref28","article-title":"Interface-based side channel attack against intel sgx","author":"Wang","year":"2018","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/SP46215.2023.10179309"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/DAC18074.2021.9586178"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545376.pdf?arnumber=10545376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:17:46Z","timestamp":1717906666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545376","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}