{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:50:00Z","timestamp":1776725400237,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-18-C-0020"],"award-info":[{"award-number":["HR0011-18-C-0020"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["CCF-1823444"],"award-info":[{"award-number":["CCF-1823444"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1823444, CNS-1652925"],"award-info":[{"award-number":["CCF-1823444, CNS-1652925"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304060","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"395-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Context-Sensitive Fencing"],"prefix":"10.1145","author":[{"given":"Mohammadkazem","family":"Taram","sequence":"first","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"given":"Ashish","family":"Venkat","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Dean","family":"Tullsen","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Onur Aciicmez Werner Schindler and Cetin K Kocc. 2007. Cache based remote timing attack on the AES. In Cryptographers' Track at the RSA Conference. 10.1007\/11967668_18","DOI":"10.1007\/11967668_18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080232"},{"key":"e_1_3_2_1_4_1","first-page":"24","article-title":"White paper","volume":"1","author":"AMD.","year":"2018","unstructured":"AMD. 2018. White paper: SOFTWARE TECHNIQUES FOR MANAGING SPECULATION ON AMD PROCESSORS. Technical Report REVISION 1.24.18. https:\/\/developer.amd.com\/wp-content\/resources\/Managing-Speculation-on-AMD-Processors.pdf.","journal-title":"SOFTWARE TECHNIQUES FOR MANAGING SPECULATION ON AMD PROCESSORS. Technical Report REVISION"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002187"},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. 2018. Whitepaper: Cache Speculation Side-channels. Technical Report Version 2.2. https:\/\/developer.arm.com\/-\/media\/developer\/pdf\/Security%20update%2010%20July%2018\/Cache_Speculation_Side-channels-v2.2.pdf?revision=7de26366-a49f-4c23--85f0--34e8f5e38881."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706179"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.82"},{"key":"e_1_3_2_1_9_1","volume-title":"Denver: Nvidia's First 64-bit ARM Processor","author":"Boggs Darrell","year":"2015","unstructured":"Darrell Boggs, Gary Brown, Nathan Tuck, and K. S. Venkatraman. 2015. Denver: Nvidia's First 64-bit ARM Processor. IEEE Micro (2015)."},{"key":"e_1_3_2_1_10_1","volume-title":"Mitigating Speculative Attacks in Crypto. https:\/\/github.com\/HACS-workshop\/spectre-mitigations\/blob\/master\/crypto_guidelines.md. Online","author":"Carruth Chandler","year":"2018","unstructured":"Chandler Carruth. 2018. Mitigating Speculative Attacks in Crypto. https:\/\/github.com\/HACS-workshop\/spectre-mitigations\/blob\/master\/crypto_guidelines.md. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_11_1","volume-title":"RFC: Speculative Load Hardening (a Spectre variant1 mitigation). https:\/\/docs.google.com\/document\/d\/1wwcfv3UV9ZnZVcGiGuoITT_61e_Ko3TmoCS3uXLcJR0\/edit. Online","author":"Carruth Chandler","year":"2018","unstructured":"Chandler Carruth. 2018. RFC: Speculative Load Hardening (a Spectre variant1 mitigation). https:\/\/docs.google.com\/document\/d\/1wwcfv3UV9ZnZVcGiGuoITT_61e_Ko3TmoCS3uXLcJR0\/edit. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_12_1","volume-title":"RFC: Speculative Load Hardening (a Spectre variant1 mitigation). https:\/\/lists.llvm.org\/pipermail\/llvm-dev\/2018-March\/122085.html. Online","author":"Carruth Chandler","year":"2018","unstructured":"Chandler Carruth. 2018. RFC: Speculative Load Hardening (a Spectre variant1 mitigation). https:\/\/lists.llvm.org\/pipermail\/llvm-dev\/2018-March\/122085.html. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_13_1","volume-title":"Lai","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2018. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR, Vol. abs\/1802.09085 (2018). arxiv: 1802.09085 http:\/\/arxiv.org\/abs\/1802.09085"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.18"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945034"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123955"},{"key":"e_1_3_2_1_17_1","volume-title":"The current state of kernel page-table isolation. https:\/\/lwn.net\/Articles\/741878\/. Online","author":"Corbet Jonathan","year":"2018","unstructured":"Jonathan Corbet. 2017. The current state of kernel page-table isolation. https:\/\/lwn.net\/Articles\/741878\/. Online; accessed Jan 2018."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859660"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055626.1055636"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776263"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151004"},{"key":"e_1_3_2_1_27_1","unstructured":"Craig Disselkoen David Kohlbrenner Leo Porter and Dean Tullsen. 2017. Prime"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241195"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214297"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277311"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0141-6"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9224-2"},{"key":"e_1_3_2_1_36_1","volume-title":"d.}. wrk - a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk. Online","year":"2018","unstructured":"Github. {n. d.}. wrk - a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk. Online; accessed Jun 2018."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831200"},{"key":"e_1_3_2_1_39_1","volume-title":"Daniel and Stefan Mangard","author":"Wagner Klaus Gruss Maurice Cl\u00e9mentine","year":"2016","unstructured":"Maurice Cl\u00e9mentine Wagner Klaus Gruss, Daniel and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70748"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_18"},{"key":"e_1_3_2_1_45_1","unstructured":"Intel. 2014. Software guard extensions programming reference. (2014). \"https:\/\/software.intel.com\/sites\/default\/files\/329298-001.pdf\""},{"key":"e_1_3_2_1_48_1","unstructured":"Intel Corporation. 2009. Inteltextsuperscript\u00ae 64 and IA-32 Architectures Optimization Reference Manual."},{"key":"e_1_3_2_1_49_1","volume-title":"Reading privileged memory with a side-channel. https:\/\/googleprojectzero.blogspot.com\/2018\/01\/reading-privileged-memory-with-side.html. Online","author":"Jann Horn Project Zero","year":"2018","unstructured":"Project Zero Jann Horn. 2018. Reading privileged memory with a side-channel. https:\/\/googleprojectzero.blogspot.com\/2018\/01\/reading-privileged-memory-with-side.html. Online; accessed Jan 2018."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2845083"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2002.804378"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062313"},{"key":"e_1_3_2_1_53_1","volume-title":"Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh.","author":"Khasawneh Khaled N","year":"2018","unstructured":"Khaled N Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2018. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. arXiv preprint arXiv:1806.05179 (2018)."},{"key":"e_1_3_2_1_54_1","volume-title":"Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757 (2018)."},{"key":"e_1_3_2_1_55_1","volume-title":"Speculative Buffer Overflows: Attacks and Defenses. arXiv preprint arXiv:1807.03757","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. arXiv preprint arXiv:1807.03757 (2018)."},{"key":"e_1_3_2_1_56_1","unstructured":"Paul Kocher. 2018. Spectre Mitigations in Microsoft's C\/C"},{"key":"e_1_3_2_1_57_1","volume-title":"https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html. Online","year":"2018","unstructured":"Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_58_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan.","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan. 2018). arxiv: 1801.01203"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/3307423.3307426"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/3307423.3307426"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328408.1328410"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277276"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_64_1","unstructured":"Jason Lowe-Power. 2018. Visualizing Spectre with gem5. http:\/\/www.lowepower.com\/jason\/visualizing-spectre-with-gem5.html. Online; accessed Jun 2018."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214300"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/144953.144998"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_68_1","volume-title":"Analysis and mitigation of speculative store bypass (CVE-2018--3639). https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018--3639\/. Online","author":"Microsoft Security Response Center (MSRC) Matt Miller. 2018.","year":"2018","unstructured":"Microsoft Security Response Center (MSRC) Matt Miller. 2018. Analysis and mitigation of speculative store bypass (CVE-2018--3639). https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018--3639\/. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381917"},{"key":"e_1_3_2_1_70_1","volume-title":"You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass. CoRR","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Tobias Reiher, Mark Silberstein, and Christof Fetzer. 2018. You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass. CoRR, Vol. abs\/1805.08506 (2018). arxiv: 1805.08506 http:\/\/arxiv.org\/abs\/1805.08506"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016604.2016635"},{"key":"e_1_3_2_1_73_1","volume-title":"Spectre mitigations in MSVC. https:\/\/blogs.msdn.microsoft.com\/vcblog\/2018\/01\/15\/spectre-mitigations-in-msvc\/. Online","author":"Pardoe Andrew","year":"2018","unstructured":"Andrew Pardoe. 2018. Spectre mitigations in MSVC. https:\/\/blogs.msdn.microsoft.com\/vcblog\/2018\/01\/15\/spectre-mitigations-in-msvc\/. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_74_1","unstructured":"Joseph CH Park and Mike Schlansker. 1991. On predicated execution .Hewlett-Packard Laboratories Palo Alto California."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/1412202.1412204"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_77_1","volume-title":"NetSpectre: Read Arbitrary Memory over Network. arXiv preprint arXiv:1807.10535","author":"Schwarz Michael","year":"2018","unstructured":"Michael Schwarz, Martin Schwarzl, Moritz Lipp, and Daniel Gruss. 2018. NetSpectre: Read Arbitrary Memory over Network. arXiv preprint arXiv:1807.10535 (2018)."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_79_1","volume-title":"LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels. arXiv preprint arXiv:1806.07480","author":"Stecklina Julian","year":"2018","unstructured":"Julian Stecklina and Thomas Prescher. 2018. LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels. arXiv preprint arXiv:1806.07480 (2018)."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00058"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_83_1","volume-title":"MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols. CoRR","author":"Trippel Caroline","year":"2018","unstructured":"Caroline Trippel, Daniel Lustig, and Margaret Martonosi. 2018. MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols. CoRR, Vol. abs\/1802.03802 (2018). arxiv: 1802.03802 http:\/\/arxiv.org\/abs\/1802.03802"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/232974.232993"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.224449"},{"key":"e_1_3_2_1_86_1","volume-title":"Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886. Online","author":"Turner Paul","year":"2018","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886. Online; accessed Jul 2018."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"e_1_3_2_1_90_1","unstructured":"Ashish Venkat Arvind Krishnaswamy Koichi Yamada and Rajan Palanivel. 2015. Binary Translation driven Program State Relocation. In United States Patent Grant US009135435B2."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872408"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665692"},{"key":"e_1_3_2_1_93_1","volume-title":"2008 IEEE 14th International Symposium on High Performance Computer Architecture. 173--184","author":"Venkataramani G.","unstructured":"G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. 2008. FlexiTaint: A programmable accelerator for dynamic taint propagation. In 2008 IEEE 14th International Symposium on High Performance Computer Architecture. 173--184."},{"key":"e_1_3_2_1_94_1","volume-title":"NDSS","volume":"2007","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.. In NDSS, Vol. 2007. 12."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_1_96_1","volume-title":"Marina Minkin, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Raoul Strackx, Thomas F. Wenisch, and Yuval Yarom.","author":"Weisse Ofir","year":"2018","unstructured":"Ofir Weisse, Jo Van Bulck, Marina Minkin, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Raoul Strackx, Thomas F. Wenisch, and Yuval Yarom. 2018. Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution. Technical report (2018). See also USENIX Security paper Foreshadow citeforeshadow."},{"key":"e_1_3_2_1_97_1","unstructured":"Troy Wolverton. 2018. Spectre and Meltdown are now a legal pain for Intel the chip maker faces 35 lawsuits over the attacks. https:\/\/www.businessinsider.com\/35-lawsuits-have-been-filed-against-intel-over-spectre-and-meltdown-2018--2. Online; accessed Aug 2018."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362802"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267345"},{"key":"e_1_3_2_1_100_1","volume-title":"InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 428--441","author":"Yan M.","unstructured":"M. Yan, J. Choi, D. Skarlatos, A. Morrison, C. Fletcher, and J. Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 428--441."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution Low Noise L3 Cache Side-Channel Attack.. In USENIX Security.","DOI":"10.5555\/2671225.2671271"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_17"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_104_1","unstructured":"Craig Zilles. 2001. Linked List Traversal Micro-Benchmark. http:\/\/zilles.cs.illinois.edu\/llubenchmark.html. Online; accessed Jun 2018."}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304060","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304060"}},"subtitle":["Securing Speculative Execution via Microcode Customization"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":100,"alternative-id":["10.1145\/3297858.3304060","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304060","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}