{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:13Z","timestamp":1773511093325,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/micro.2016.7783741","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T22:11:05Z","timestamp":1482185465000},"page":"1-13","source":"Crossref","is-referenced-by-count":36,"title":["PoisonIvy: Safe speculation for secure memory"],"prefix":"10.1109","author":[{"given":"Tamara Silbergleit","family":"Lehman","sequence":"first","affiliation":[]},{"given":"Andrew D.","family":"Hilton","sequence":"additional","affiliation":[]},{"given":"Benjamin C.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2004.1342547"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.11"},{"key":"ref31","first-page":"285","article-title":"Nosq: Store-load communication without a store queue","author":"sha","year":"2006","journal-title":"International Symposium on Microarchitecture (MICRO)"},{"key":"ref30","first-page":"159","article-title":"Scalable store-load forwarding via store queue index prediction","author":"sha","year":"2005","journal-title":"Proc Intl Symp Microar- Chitecture (MICRO)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.26"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024407"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2011.4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658636"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250705"},{"key":"ref2","article-title":"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, authoreEnck, William and Gilbert, Peter and Han, Seungyeop and Tendulkar, Vasant and Chun, Byung-Gon and Cox, Landon P and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N, journal='Iransactions on Computer Systems (TOCS), pages=5, year=2014, publisher=ACM","year":"0"},{"key":"ref1","year":"2006","journal-title":"Standard Performance Evaluation Corporation (SPEC) CPu&#x2122;"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024782"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"ref23","first-page":"1050","article-title":"MARSSx86: A full system simulator for x86 CPUs","author":"patel","year":"2011","journal-title":"Design Automation Conference (DAC)"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/1152154.1152170","article-title":"Efficient Data Protection for Distributed Shared Memory Multiprocessors","author":"brian rogers","year":"2006","journal-title":"In International Conference on Parallel Architectures and Compilation Techniques (PACT)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.31"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669174"},{"key":"ref12","article-title":"A memory encryption engine suitable for general purpose processors","author":"gueron","year":"2016","journal-title":"International Association for Cryptologic Research (IACR)"},{"key":"ref13","article-title":"Haswell cryptographic performance","author":"gulley","year":"2013","journal-title":"Intel Corporation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2120970"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27659-5_23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/356989.357005","article-title":"Architectural support for copy and tamper resistant software","author":"lie","year":"2000","journal-title":"ACM SIGPLAN Notices"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"ref4","article-title":"Intel software guard extensions (Intel SGX)","author":"anati","year":"2015","journal-title":"Intl Symp on Computer Architecture tutorial (ISCA)"},{"key":"ref3","first-page":"10","article-title":"Innovative technology for cpu based attestation and sealing","author":"anati","year":"2013","journal-title":"International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995914"},{"key":"ref5","article-title":"Benchmarking modern multiprocessors","author":"bienia","year":"2011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"ref7","article-title":"Intel SGX explained","author":"costan","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref49","first-page":"351","article-title":"Fast secure processor for inhibiting software piracy and tampering","author":"yang","year":"2003","journal-title":"Proc Intl Symp Microar- Chitecture (MICRO)"},{"key":"ref9","first-page":"289","article-title":"TEC-Tree: A low cost, parallelizable tree for efficient defense against memory replay attacks","author":"elbaz","year":"2007","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES) Springer"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1995.524546"},{"key":"ref45","first-page":"59","article-title":"CMOS VLSI design","author":"weste","year":"2005","journal-title":"A Circuits and Systems Perspective"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/1150019.1136502","article-title":"Improving cost, performance, and security of memory encryption and authentication","author":"yan","year":"2006","journal-title":"International Symposium on Computer Architecture (ISCA)"},{"key":"ref47","first-page":"246","article-title":"Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks","author":"xia","year":"2013","journal-title":"International Symposium on High Performance Computer Architecture (HPCA)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"ref44","first-page":"273","article-title":"Mem-tracker: Efficient and programmable support for memory access monitoring and debugging","author":"venkataramani","year":"2007","journal-title":"International Symposium on High Performance Computer Architecture (HPCA)"},{"key":"ref43","first-page":"173","article-title":"Flexitaint: A programmable accelerator for dynamic taint propagation","author":"venkataramani","year":"2008","journal-title":"International Symposium on High Performance Computer Architecture (HPCA)"}],"event":{"name":"2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","location":"Taipei, Taiwan","start":{"date-parts":[[2016,10,15]]},"end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7777315\/7783693\/07783741.pdf?arnumber=7783741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T18:51:38Z","timestamp":1568659898000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7783741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/micro.2016.7783741","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}