{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:39Z","timestamp":1772725599618,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:00:00Z","timestamp":1559433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1422401,1619322,1619450,1718997"],"award-info":[{"award-number":["1422401,1619322,1619450,1718997"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2893"],"award-info":[{"award-number":["N00014-17-1-2893"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,2]]},"DOI":"10.1145\/3316781.3317903","type":"proceedings-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:07:13Z","timestamp":1558634833000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["SafeSpec"],"prefix":"10.1145","author":[{"given":"Khaled N.","family":"Khasawneh","sequence":"first","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Esmaeil Mohammadian","family":"Koruyeh","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Dmitry","family":"Evtyushkin","sequence":"additional","affiliation":[{"name":"College of William and Mary"}]},{"given":"Dmitry","family":"Ponomarev","sequence":"additional","affiliation":[{"name":"Binghamton University"}]},{"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]}],"member":"320","published-online":{"date-parts":[[2019,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/developer.arm.com\/support\/security-update","author":"Vulnerability","year":"2018"},{"key":"e_1_3_2_1_2_1","volume-title":"A systematic evaluation of transient execution attacks and defenses. arXiv preprint arXiv:1811.05441","author":"Canella C.","year":"2018"},{"key":"e_1_3_2_1_3_1","volume-title":"Sgxpectre attacks: Leaking enclave secrets via speculative execution. arXiv preprint arXiv:1802.09085","author":"Chen G.","year":"2018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of USENIX Security","author":"Gras B.","year":"2018"},{"key":"e_1_3_2_1_6_1","volume-title":"KPTI meltdown initial performance regressions","author":"Gregg B.","year":"2018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_2_1_8_1","volume-title":"Reading privileged memory with a side-channel","author":"Horn J.","year":"2018"},{"key":"e_1_3_2_1_9_1","volume-title":"speculative execution, variant 4: speculative store by-pass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528","author":"Horn J.","year":"2018"},{"key":"e_1_3_2_1_10_1","volume-title":"Intel analysis of speculative execution side channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf","author":"Intel","year":"2018"},{"key":"e_1_3_2_1_11_1","volume-title":"Retpoline: A branch target injection mitigation. https:\/\/software.intel.com\/security-software-guidance\/api-app\/sites\/default\/files\/Retpoline-A-Branch-Target-Injection-Mitigation.pdf","author":"Intel","year":"2018"},{"key":"e_1_3_2_1_12_1","volume-title":"Safespec: Banishing the spectre of a meltdown with leakage-free speculation. arXiv preprint arXiv:1806.05179","author":"Khasawneh K. N.","year":"2018"},{"key":"e_1_3_2_1_13_1","unstructured":"Kiriansky v. Lebedev I. Amarasinghe S. Devadas S. and Emer J. Dawg: A defense against cache timing attacks in speculative execution processors.  Kiriansky v. Lebedev I. Amarasinghe S. Devadas S. and Emer J. Dawg: A defense against cache timing attacks in speculative execution processors."},{"key":"e_1_3_2_1_14_1","volume-title":"Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757","author":"Kiriansky V.","year":"2018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of WOOT","author":"Koruyeh E.","year":"2018"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of USENIX Security","author":"Lipp M.","year":"2018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_19_1","volume-title":"Speculose: Analyzing the security implications of speculative execution in CPUs. arXiv preprint arXiv:1801.04084","author":"Maisuradze G.","year":"2018"},{"key":"e_1_3_2_1_20_1","volume-title":"You shall not bypass: Employing data dependencies to prevent bounds check bypass. arXiv preprint arXiv:1805.08506","author":"Oleksenko O.","year":"2018"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of QUF","author":"Patel A.","year":"2011"},{"key":"e_1_3_2_1_22_1","unstructured":"Projects T. C. Site isolation. http:\/\/www.chromium.org\/Home\/chromium-security\/site-isolation.  Projects T. C. Site isolation. http:\/\/www.chromium.org\/Home\/chromium-security\/site-isolation."},{"key":"e_1_3_2_1_24_1","volume-title":"Lazyfp: Leaking fpu register state using microarchitectural side-channels. arXiv preprint arXiv:1806.07480","author":"Stecklina J.","year":"2018"},{"key":"e_1_3_2_1_25_1","volume-title":"Meltdownprime and spectreprime: Automatically-synthesized attacks exploiting invalidation-based coherence protocols. arXiv preprint arXiv:1802.03802","author":"Trippel C.","year":"2018"},{"key":"e_1_3_2_1_26_1","volume-title":"Feb.","author":"Tung L.","year":"2018"},{"key":"e_1_3_2_1_27_1","volume-title":"Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886","author":"Turner P.","year":"2018"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of USENIX","author":"Van B., J.","year":"2018"},{"key":"e_1_3_2_1_29_1","volume-title":"Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution. Tech. rep","author":"Weisse O.","year":"2018"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of USENIX Security","author":"Yarom Y.","year":"2014"}],"event":{"name":"DAC '19: The 56th Annual Design Automation Conference 2019","location":"Las Vegas NV USA","acronym":"DAC '19","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 56th Annual Design Automation Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316781.3317903","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316781.3317903","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316781.3317903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:53Z","timestamp":1750204433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316781.3317903"}},"subtitle":["Banishing the Spectre of a Meltdown with Leakage-Free Speculation"],"short-title":[],"issued":{"date-parts":[[2019,6,2]]},"references-count":30,"alternative-id":["10.1145\/3316781.3317903","10.1145\/3316781"],"URL":"https:\/\/doi.org\/10.1145\/3316781.3317903","relation":{},"subject":[],"published":{"date-parts":[[2019,6,2]]},"assertion":[{"value":"2019-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}