{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:03Z","timestamp":1740100443957,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007130","name":"University of Texas System","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647804","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["The Race-Timing Prototype"],"prefix":"10.1109","author":[{"given":"Andres R.","family":"Hernandez C","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wonjun","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei-Ming","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1147\/rd.111.0025"},{"article-title":"Intel&#x00AE;64 and ia-32 architectures software developer&#x2019;s manual combined volumes 2a, 2b, 2c, and 2d: Instruction set reference, a-z","year":"2019","author":"corporation","key":"ref11"},{"key":"ref12","article-title":"Spectector: Principled detection of speculative information flows","author":"guarnieri","year":"2019","journal-title":"arXiv preprint arXiv 1812 08942"},{"journal-title":"Amd64 architectureprogrammers manualvolume 3 general-purpose and system instructions","year":"2020","key":"ref13"},{"journal-title":"Software techniques for managing speculation on amd processors","year":"2018","key":"ref14"},{"key":"ref15","article-title":"The uncore: A modular approach to feeding the high-performance cores","volume":"14","author":"hill","year":"2010","journal-title":"Intel Technology Journal"},{"journal-title":"How to benchmark code execution times on intel&#x00AE;ia-32 and ia-64 instruction set architectures","year":"2010","author":"paoloni","key":"ref16"},{"journal-title":"Processor programming reference (ppr) for amd family 17h model 01h revision b1 processors","year":"2017","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref19","first-page":"147","article-title":"Advances on access-driven cache attacks on aes","author":"neve","year":"2006","journal-title":"Workshop Selected Areas in Cryptography"},{"key":"ref4","article-title":"Meltdown","author":"lipp","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"ref6","first-page":"719","article-title":"Flush + reload: a high resolution, low noise, l3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref5","article-title":"Spectre attacks: Exploiting speculative execution","author":"kocher","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"article-title":"Intel&#x00AE;64 and ia-32 architectures software developer&#x2019;s manual combined volumes 3a, 3b, 3c, and 3d: System programming guide","year":"2019","author":"corporation","key":"ref8"},{"key":"ref7","article-title":"Theory and practice of finding eviction sets","author":"vila","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"ref9","first-page":"51","article-title":"Prime + abort: A timer-free high-precision l3 cache attack using intel {TSX}","author":"disselkoen","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"journal-title":"Intel&#x00AE;64 and ia-32 architectures software developer&#x2019;s manual volume 1 Basic architecture","year":"2019","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"journal-title":"Desktop 4th generation intel&#x00AE;core&#x2122; processor family desktop intel&#x00AE; pentium&#x00AE; processor family and desktop intel&#x00AE;celeron&#x00AE; processor family specification update","year":"2020","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"ref23","first-page":"1","article-title":"Intel sgx explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptol ePrint Arch"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647804.pdf?arnumber=9647804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647804","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}