{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:30:49Z","timestamp":1730273449856,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131863","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process"],"prefix":"10.1109","author":[{"given":"Richard","family":"Ward","sequence":"first","affiliation":[{"name":"University of South Wales,Faculty of Computing, Engineering and Mathematics,Pontypridd,UK"}]},{"given":"Andrew","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of South Wales,Faculty of Computing, Engineering and Mathematics,Pontypridd,UK"}]}],"member":"263","reference":[{"article-title":"Addendum 2 to RIDL: Rogue In-flight Data Load","year":"2020","author":"van schaik","key":"ref13"},{"article-title":"Meltdown","year":"2018","author":"lipp","key":"ref12"},{"article-title":"Addendum 1 to RIDL: Rogue In-flight Data Load","year":"2020","author":"van schaik","key":"ref15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref11","article-title":"Meltdown: Reading Kernel Memory from User Space","volume":"18","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symp"},{"article-title":"jstemplate","year":"2019","author":"schwarz","key":"ref10"},{"article-title":"ZombieLoad","year":"2021","author":"schwarz","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116291"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"article-title":"Google\/rowhammer-test","year":"2015","author":"lee","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"article-title":"Spectre","year":"2018","author":"kocher","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"article-title":"RIDL","year":"2021","author":"van schaik","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800753"},{"journal-title":"International Organization for Standardization ISO\/IEC\/IEEE 29119 - Software and Systems Engineering - Software Testing Test Processes","year":"2015","key":"ref3"},{"article-title":"revanc","year":"2017","author":"gras","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2023,5,11]]},"location":"Chattanooga, TN, USA","end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131863.pdf?arnumber=10131863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:45:51Z","timestamp":1687196751000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131863","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}