{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T18:56:53Z","timestamp":1767207413939,"version":"3.48.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3535374","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T14:20:08Z","timestamp":1738160408000},"page":"3647-3660","source":"Crossref","is-referenced-by-count":0,"title":["Low-Overhead Reversible Coherence Protocol"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1410-3196","authenticated-orcid":false,"given":"You","family":"Wu","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Xuehai","family":"Qian","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480074"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"ref4","first-page":"72","article-title":"The parsec benchmark suite: Characterization and architectural implications","volume-title":"Proc. 17th Int. Conf. Parallel Architectures Compilation Techn.","author":"Bienia"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480068"},{"article-title":"Leaky frontends: Micro-op cache and processor frontend vulnerabilities","year":"2021","author":"Deng","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1992.276232"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421216"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669165"},{"key":"ref14","first-page":"1","article-title":"SafeSpec: Banishing the spectre of a meltdown with leakage-free speculation","volume-title":"Proc. 56th ACM\/IEEE Des. Automat. Conf.","author":"Khasawneh"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480079"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mdat.2024.3352537"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/2.121510"},{"key":"ref19","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"Proc. 27th {USENIX} Secur. Symp.","author":"Lipp"},{"key":"ref20","first-page":"2021","article-title":"$\\lbrace${DOLMA $\\rbrace$}: Securing speculation with the principle of transient non-observability","volume-title":"Proc. 30th {USENIX} Secur. Symp.","author":"Loughlin"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/isca52012.2021.00036"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358314"},{"key":"ref23","first-page":"723","article-title":"Efficient invisible speculative execution through selective delay and value prediction","volume-title":"Proc. 46th Int. Symp. Comput. Archit.","author":"Sakalis"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3410463.3414640"},{"article-title":"Meltdownprime and spectreprime: Automatically-synthesized attacks exploiting invalidation-based coherence protocols","year":"2018","author":"Trippel","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00064"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507724"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10858001.pdf?arnumber=10858001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T18:46:58Z","timestamp":1767206818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3535374","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}