{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:32:10Z","timestamp":1730302330017,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,16]]},"DOI":"10.1109\/vdat53777.2021.9600982","type":"proceedings-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T23:41:04Z","timestamp":1636587664000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["On Disabling Prefetcher to Amplify Cache Side Channels"],"prefix":"10.1109","author":[{"given":"Nirmal Kumar","family":"Boran","sequence":"first","affiliation":[]},{"given":"Kenrick","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Bernard","family":"Menezes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"eran","year":"2010","journal-title":"Journal of Cryptology"},{"journal-title":"Proceedings of the 56th Annual Design Automation Conference","year":"2019","author":"daimeng","key":"ref11"},{"journal-title":"Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy","year":"1992","author":"hu","key":"ref12"},{"journal-title":"Annual International Cryptology Conference","year":"1996","author":"kocher","key":"ref13"},{"key":"ref14","first-page":"1","volume":"169","author":"page","year":"2002","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref15","first-page":"388","volume":"2005","author":"zhou","year":"0","journal-title":"IACR Cryptol ePrint Arch"},{"first-page":"3","year":"2005","author":"bernstein","key":"ref16"},{"first-page":"1","year":"2005","author":"percival","key":"ref17"},{"journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems","year":"2010","author":"ac?i\u00e7mez","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"2015 IEEE Symposium on Security and Privacy","year":"2015","author":"gorka","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"first-page":"1","year":"2005","author":"colin","key":"ref3"},{"journal-title":"Proceedings of the 1997 International Conference on Parallel Processing (Cat No 97TB100162)","year":"1997","author":"sunil","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s41635-019-00082-w","volume":"4","author":"ashokkumar","year":"2020","journal-title":"Journal of Hardware and Systems Security"},{"journal-title":"10th International Symposium on High Performance Computer Architecture (HPCA 04)","year":"2004","author":"nesbit kyle","key":"ref8"},{"key":"ref7","first-page":"1","volume":"44","author":"ashokkumar","year":"2019","journal-title":"S?dhan?"},{"journal-title":"23rd USENIX Security Symposium (USENIX Security 14)","year":"2014","author":"yuval","key":"ref2"},{"key":"ref9","first-page":"1","volume":"13","author":"marius","year":"2011","journal-title":"Journal of Instruction-Level Parallelism"},{"journal-title":"2015 IEEE Symposium on Security and Privacy","year":"2015","author":"fangfei","key":"ref1"},{"key":"ref20","article-title":"The design of Rijndael: AES-the advanced encryption standard","author":"joan","year":"2002","journal-title":"Information Security and Cryptography"},{"year":"2005","author":"page","key":"ref22"},{"journal-title":"Workshop Selected Areas in Cryptography","year":"2006","author":"neve","key":"ref21"},{"journal-title":"Proceedings of the 8th ACM International Systemsand Storage Conference (SYSTOR&#x2019;15)","year":"2015","author":"fuchs","key":"ref24"},{"journal-title":"Proceedings of the 34th Annual International Symposium on Computer Architecture","year":"2007","author":"wang","key":"ref23"},{"key":"ref26","first-page":"1","volume":"39","author":"nathan","year":"2011","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0609-3"}],"event":{"name":"2021 25th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2021,9,16]]},"location":"Surat, India","end":{"date-parts":[[2021,9,18]]}},"container-title":["2021 25th International Symposium on VLSI Design and Test (VDAT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9600867\/9600899\/09600982.pdf?arnumber=9600982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:50:51Z","timestamp":1652201451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9600982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,16]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/vdat53777.2021.9600982","relation":{},"subject":[],"published":{"date-parts":[[2021,9,16]]}}}