{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:25:32Z","timestamp":1740101132250,"version":"3.37.3"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"publisher","award":["2019 ANR NRF 0092"],"award-info":[{"award-number":["2019 ANR NRF 0092"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,13]]},"DOI":"10.1109\/memocode57689.2022.9954595","type":"proceedings-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:22:51Z","timestamp":1669666971000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage"],"prefix":"10.1109","author":[{"given":"Eric","family":"Rothstein-Morris","sequence":"first","affiliation":[{"name":"ISTD Singapore University of Technology and Design,Singapore"}]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems SMU,Singapore"}]},{"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"ISTD Singapore University of Technology and Design,Singapore"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_8"},{"journal-title":"gdk3 keyboard handling","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370305"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3371129"},{"key":"ref37","first-page":"719","article-title":"Flush+reload: A high resolution, low noise, 13 cache side-channel attack","author":"yarom","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"ref35","first-page":"1","article-title":"oo7: Low-overhead defense against spectre attacks via program analysis","author":"wang","year":"2019","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3434330"},{"key":"ref10","first-page":"917","article-title":"Vale: Verifying high-performance cryptographic assembly code","author":"bond","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385970"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314605"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3288758"},{"key":"ref14","first-page":"431","article-title":"Cacheaudit: A tool for the static analysis of cache side channels","author":"doychev","year":"2013","journal-title":"22nd USENIX Security Symposium (USENIX Security'13) USENIX"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00063"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_40"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44957-4_38"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892230"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.10.008"},{"key":"ref27","first-page":"431","article-title":"Raccoon: Closing digital side-channels through obfuscated execution","author":"rane","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"journal-title":"Cryptocoding","year":"2019","author":"aumasson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00031"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00009"},{"key":"ref5","first-page":"2019","article-title":"Sok: Computer-aided cryptography","author":"barbosa","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"journal-title":"Cache-timing attacks on AES","year":"2005","author":"bernstein","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1718"},{"key":"ref2","first-page":"53","article-title":"Verifying constant-time implementations","author":"almeida","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134078"},{"journal-title":"LibTomCrypt","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.11"},{"key":"ref21","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref24","article-title":"The program counter security model: Automatic detection and removal of control-flow side channel attacks. Baltimore, MD","author":"molnar","year":"2005","journal-title":"USENIX Association"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref26","article-title":"Verified low-level programming embedded in f?","author":"protzenko","year":"0","journal-title":"Proc ACM Program Lang 1(ICFP)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.53"}],"event":{"name":"2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)","start":{"date-parts":[[2022,10,13]]},"location":"Shanghai, China","end":{"date-parts":[[2022,10,14]]}},"container-title":["2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9954458\/9954381\/09954595.pdf?arnumber=9954595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T20:08:54Z","timestamp":1671480534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9954595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,13]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/memocode57689.2022.9954595","relation":{},"subject":[],"published":{"date-parts":[[2022,10,13]]}}}