{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:38:38Z","timestamp":1774456718941,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833570","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"1491-1505","source":"Crossref","is-referenced-by-count":40,"title":["Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest"],"prefix":"10.1109","author":[{"given":"Jose Rodrigo Sanchez","family":"Vicarte","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Michael","family":"Flanders","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Riccardo","family":"Paccagnella","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Grant","family":"Garrett-Grossman","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"David","family":"Kohlbrenner","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"263","reference":[{"key":"ref13","article-title":"The Poly1305-AES Message-Authentication Code","author":"bernstein","year":"2005","journal-title":"FSE"},{"key":"ref12","year":"2020","journal-title":"Optimize for apple silicon with performance and efficiency cores"},{"key":"ref15","author":"carruth","year":"0","journal-title":"Speculative load hardening"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"ref11","year":"2020","journal-title":"Apple event"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173189"},{"key":"ref17","article-title":"Leaking control flow information via the hardware prefetcher","author":"chen","year":"2021","journal-title":"ArXiv"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/635508.605427"},{"key":"ref51","author":"yu","year":"2017","journal-title":"Hardware prefetcher for indirect access patterns"},{"key":"ref50","article-title":"Imp: Indirect memory prefetcher","author":"yu","year":"2015","journal-title":"Micro"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00042"},{"key":"ref45","article-title":"Opening Pandora&#x2019;s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data","author":"sanchez vicarte","year":"2021","journal-title":"ISCA"},{"key":"ref48","article-title":"Flush+Reload: A high resolution, low noise, L3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"Sec"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243736"},{"key":"ref41","author":"subramoney","year":"2021","journal-title":"System method and apparatus for enhanced pointer identification and prefetching"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378453"},{"key":"ref43","article-title":"TLB;DR: Enhancing TLB-based attacks with TLB desynchronized reverse engineering","author":"tatar","year":"2022","journal-title":"Sec"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23061"},{"key":"ref8","article-title":"Predicting secret keys via branch prediction","author":"aciicmez","year":"2006","journal-title":"IACR"},{"key":"ref7","year":"0","journal-title":"Speculative load hardening"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2925426.2926254"},{"key":"ref4","year":"0","journal-title":"Software optimization guide for amd epyc 7003 processors"},{"key":"ref3","year":"0","journal-title":"Mach absolute timer"},{"key":"ref6","year":"0","journal-title":"Spectre V1 defense in GCC"},{"key":"ref5","year":"0","journal-title":"Spectre Attack Example"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/384265.291034"},{"key":"ref35","article-title":"Cache attacks and countermeasures: The case of aes","author":"osvik","year":"2006","journal-title":"CT-RSA&#x2019;04"},{"key":"ref34","author":"martin","year":"2021","journal-title":"M1 dram scaling observed"},{"key":"ref37","first-page":"377","article-title":"Base-Delta-Immediate Compression: Practical Data Compression for On-Chip Caches","author":"gennady pekhimenko","year":"2012","journal-title":"In International Conference on Parallel Architectures and Compilation Techniques (PACT)"},{"key":"ref36","article-title":"Lord of the ring(s): Side channel attacks on the CPU on-chip ring interconnect are practical","author":"paccagnella","year":"2021","journal-title":"Sec"},{"key":"ref31","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"Sec"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref33","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"Sec"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/339647.339678"},{"key":"ref2","year":"0","journal-title":"Intel x86 64 and ia32 developers manual"},{"key":"ref1","year":"0","journal-title":"Energy Efficiency Guide for Mac Apps Prioritize Work at the Task Level"},{"key":"ref39","article-title":"Site isolation: Process separation for web sites within the browser","author":"reis","year":"2019","journal-title":"Sec"},{"key":"ref38","article-title":"Cache missing for fun and profit","author":"percival","year":"2005","journal-title":"Proc of BSDCan"},{"key":"ref24","article-title":"Kaslr is dead: Long live kaslr","author":"gruss","year":"2017","journal-title":"ESSoS"},{"key":"ref23","article-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks","author":"gras","year":"2018","journal-title":"Sec"},{"key":"ref26","year":"2021","journal-title":"Cores shouldn&#x2019;t all be the same M1 Macs do better"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741033"},{"key":"ref22","article-title":"Apple announces the Apple Silicon M1: Ditching x86 - What to Expect","author":"frumusanu","year":"2020","journal-title":"Based on A14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01743-8"},{"key":"ref28","author":"johnson","year":"2022","journal-title":"Apple M1 Microarchitecture Research"},{"key":"ref27","author":"johnson","year":"2021","journal-title":"Apple CPU"},{"key":"ref29","article-title":"Dawg: A defense against cache timing attacks in speculative execution processors","author":"kiriansky","year":"2018","journal-title":"Micro"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833570.pdf?arnumber=9833570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:24:12Z","timestamp":1699485852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833570","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}