{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T20:45:58Z","timestamp":1777581958566,"version":"3.51.4"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Institute of Information and Communications Technology Planning","award":["RS-2025-09942968"],"award-info":[{"award-number":["RS-2025-09942968"]}]},{"name":"Institute of Information and Communications Technology Planning","award":["RS-2025-02263869"],"award-info":[{"award-number":["RS-2025-02263869"]}]},{"name":"Institute of Information and Communications Technology Planning","award":["RS-2024-00459797"],"award-info":[{"award-number":["RS-2024-00459797"]}]},{"name":"Institute of Information and Communications Technology Planning","award":["RS-2024-00396013"],"award-info":[{"award-number":["RS-2024-00396013"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2026-25490694"],"award-info":[{"award-number":["RS-2026-25490694"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korea government"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Comput. Arch. Lett."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/lca.2026.3677441","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:54:52Z","timestamp":1774468492000},"page":"134-137","source":"Crossref","is-referenced-by-count":0,"title":["Nighthawk: Zero-Copy Cache Quarantine for Invisible Speculation"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2704-0075","authenticated-orcid":false,"given":"Minwoo","family":"Jang","sequence":"first","affiliation":[{"name":"Daegu-Gyeongbuk Institute of Science and Technology, Daegu, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7869-7145","authenticated-orcid":false,"given":"Sungju","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0837-0877","authenticated-orcid":false,"given":"Daehoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref2","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Lipp","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"ref5","first-page":"723","article-title":"Efficient invisible speculative execution through selective delay and value prediction","volume-title":"Proc. 46th Int. Symp. Comput. Archit.","author":"Sakalis","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589094"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480074"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358314"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00064"}],"container-title":["IEEE Computer Architecture Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10208\/11321093\/11456048.pdf?arnumber=11456048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T19:47:03Z","timestamp":1777405623000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11456048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":12,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/lca.2026.3677441","relation":{},"ISSN":["1556-6056","1556-6064","2473-2575"],"issn-type":[{"value":"1556-6056","type":"print"},{"value":"1556-6064","type":"electronic"},{"value":"2473-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}