{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:19:50Z","timestamp":1767183590317},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["CNS-1816226"],"award-info":[{"award-number":["CNS-1816226"]}]},{"name":"Blavatnik ICRC"},{"name":"ISF","award":["2005\/17"],"award-info":[{"award-number":["2005\/17"]}]},{"name":"Intel Strategic Research Alliance"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2020,5,1]]},"DOI":"10.1109\/mm.2020.2985359","type":"journal-article","created":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T01:49:29Z","timestamp":1586224169000},"page":"81-90","source":"Crossref","is-referenced-by-count":16,"title":["Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data"],"prefix":"10.1109","volume":"40","author":[{"given":"Jiyong","family":"Yu","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana&#x2013;Champaign"}]},{"given":"Mengjia","family":"Yan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"Artem","family":"Khyzha","sequence":"additional","affiliation":[{"name":"Tel Aviv University"}]},{"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University"}]},{"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana&#x2013;Champaign"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana&#x2013;Champaign"}]}],"member":"263","reference":[{"key":"ref4","first-page":"176","article-title":"Side-channel analysis of cryptographic software via early-terminating multiplications","author":"gro\u00dfsch\u00e4dl","year":"2009","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23061"},{"key":"ref6","first-page":"279","article-title":"Netspectre: Read arbitrary memory over network","author":"schwarz","year":"2019","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref11","article-title":"Speculative data-oblivious execution (SDO): Mobilizing safe prediction for safe and efficient speculative execution","author":"yu","year":"0","journal-title":"Proc Int Symp Comput Archit"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref12","article-title":"Speculative taint tracking (STT): A formal analysis","author":"yu","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"ref9","first-page":"719","article-title":"Flush+Reload: A high resolution, low noise, L3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/40\/9099648\/9057389-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/40\/9099648\/09057389.pdf?arnumber=9057389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T19:49:04Z","timestamp":1651693744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9057389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":12,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mm.2020.2985359","relation":{},"ISSN":["0272-1732","1937-4143"],"issn-type":[{"value":"0272-1732","type":"print"},{"value":"1937-4143","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,1]]}}}