{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:26:53Z","timestamp":1774600013281,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363194","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"785-800","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":149,"title":["SMoTherSpectre"],"prefix":"10.1145","author":[{"given":"Atri","family":"Bhattacharyya","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Alexandra","family":"Sandulescu","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich, Zurich, Switzerland"}]},{"given":"Matthias","family":"Neugschwandtner","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich, Zurich, Switzerland"}]},{"given":"Alessandro","family":"Sorniotti","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich, Zurich, Switzerland"}]},{"given":"Babak","family":"Falsafi","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Anil","family":"Kurmus","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.16"},{"key":"e_1_3_2_2_2_1","volume-title":"Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri.","author":"Aldaya Alejandro Cabrera","year":"2018","unstructured":"Alejandro Cabrera Aldaya , Billy Bob Brumley , Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2018 . Port Contention for Fun and Profit. Cryptology ePrint Archive, Report 2018\/1060. https:\/\/eprint.iacr.org\/2018\/1060. Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2018. Port Contention for Fun and Profit. Cryptology ePrint Archive, Report 2018\/1060. https:\/\/eprint.iacr.org\/2018\/1060."},{"key":"e_1_3_2_2_3_1","unstructured":"AMD. 2018. Speculative Store Bypass Disable. https:\/\/developer.amd.com\/wp-content\/resources\/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf.  AMD. 2018. Speculative Store Bypass Disable. https:\/\/developer.amd.com\/wp-content\/resources\/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf."},{"key":"e_1_3_2_2_4_1","unstructured":"Zack Bloom. 2018. Cloud Computing without Containers. https:\/\/blog.cloudflare.com\/cloud-computing-without-containers\/.  Zack Bloom. 2018. Cloud Computing without Containers. https:\/\/blog.cloudflare.com\/cloud-computing-without-containers\/."},{"key":"e_1_3_2_2_5_1","volume-title":"Michael Schwarz, Moritz Lipp, Benjamin von","author":"Canella Claudio","year":"2018","unstructured":"Claudio Canella , Jo Van Bulck , Michael Schwarz, Moritz Lipp, Benjamin von Berg , Philipp Ortner , Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2018 . A Systematic Evaluation of Transient Execution Attacks and Defenses. https:\/\/arxiv.org\/abs\/1811.05441. Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2018. A Systematic Evaluation of Transient Execution Attacks and Defenses. https:\/\/arxiv.org\/abs\/1811.05441."},{"key":"e_1_3_2_2_6_1","unstructured":"Intel Coorporation. 2016. Intel 64 and IA-32 architectures optimization reference manual.  Intel Coorporation. 2016. Intel 64 and IA-32 architectures optimization reference manual."},{"key":"e_1_3_2_2_7_1","unstructured":"Jonathan Corbet. [n.d.]. Taming STIBP. https:\/\/lwn.net\/Articles\/773118\/.  Jonathan Corbet. [n.d.]. Taming STIBP. https:\/\/lwn.net\/Articles\/773118\/."},{"key":"e_1_3_2_2_8_1","unstructured":"Craig Disselkoen David Kohlbrenner Leo Porter and Dean Tullsen. 2017. Prime  Craig Disselkoen David Kohlbrenner Leo Porter and Dean Tullsen. 2017. Prime"},{"key":"e_1_3_2_2_9_1","volume-title":"USENIX Security Symposium.","author":"Abort","unstructured":"Abort : A Timer-Free High-Precision L3 Cache Attack using Intel TSX . In USENIX Security Symposium. Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. In USENIX Security Symposium."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_2_11_1","unstructured":"Agner Fog. [n.d.]. Instruction tables: Lists of instruction latencies throughputs and micro-operation breakdowns for Intel AMD and VIA CPUs. https:\/\/www.agner.org\/optimize\/instruction_tables.pdf.  Agner Fog. [n.d.]. Instruction tables: Lists of instruction latencies throughputs and micro-operation breakdowns for Intel AMD and VIA CPUs. https:\/\/www.agner.org\/optimize\/instruction_tables.pdf."},{"key":"e_1_3_2_2_12_1","unstructured":"Anders Fogh. [n.d.]. Covert Shotgun. https:\/\/cyber.wtf\/2016\/09\/27\/covert-shotgun\/.  Anders Fogh. [n.d.]. Covert Shotgun. https:\/\/cyber.wtf\/2016\/09\/27\/covert-shotgun\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Anders Fogh and Christopher Ertl. [n.d.]. Wrangling with the Ghost: An inside story of mitigating speculative execution side channel vulnerabilities. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf.  Anders Fogh and Christopher Ertl. [n.d.]. Wrangling with the Ghost: An inside story of mitigating speculative execution side channel vulnerabilities. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf."},{"key":"e_1_3_2_2_14_1","volume-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium.","author":"Gras Ben","year":"2018","unstructured":"Ben Gras , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2018 . Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium. Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_2_2_16_1","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016. Flush  Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016. Flush"},{"key":"e_1_3_2_2_17_1","unstructured":"Flush: A Fast and Stealthy Cache Attack. In Detection of Intrusions and Malware and Vulnerability Assessment.  Flush: A Fast and Stealthy Cache Attack. In Detection of Intrusions and Malware and Vulnerability Assessment."},{"key":"e_1_3_2_2_18_1","volume-title":"29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.)","volume":"5677","author":"Heninger Nadia","year":"2009","unstructured":"Nadia Heninger and Hovav Shacham . 2009 . Reconstructing RSA Private Keys from Random Key Bits. In Advances in Cryptology - CRYPTO 2009 , 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.) , Vol. 5677 . Springer, 1--17. https:\/\/doi.org\/10.1007\/978--3--642-03356--8_1 10.1007\/978--3--642-03356--8_1 Nadia Heninger and Hovav Shacham. 2009. Reconstructing RSA Private Keys from Random Key Bits. In Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.), Vol. 5677. Springer, 1--17. https:\/\/doi.org\/10.1007\/978--3--642-03356--8_1"},{"key":"e_1_3_2_2_19_1","volume-title":"Project Zero","volume":"3","author":"Horn Jann","year":"2018","unstructured":"Jann Horn . 2018 . Reading privileged memory with a side-channel. https:\/\/googleprojectzero.blogspot.com\/2018\/01\/reading-privileged-memory-with-side.html . Project Zero , Vol. 3 (2018). Jann Horn. 2018. Reading privileged memory with a side-channel. https:\/\/googleprojectzero.blogspot.com\/2018\/01\/reading-privileged-memory-with-side.html. Project Zero, Vol. 3 (2018)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_2_21_1","unstructured":"Secure Windows Initiative. 2018. Speculative Store Bypass. https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018--3639\/.  Secure Windows Initiative. 2018. Speculative Store Bypass. https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018--3639\/."},{"key":"e_1_3_2_2_22_1","volume-title":"Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh.","author":"Khasawneh Khaled N","year":"2018","unstructured":"Khaled N Khasawneh , Esmaeil Mohammadian Koruyeh , Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2018 . SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation . arXiv preprint arXiv:1806.05179 (2018). Khaled N Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2018. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. arXiv preprint arXiv:1806.05179 (2018)."},{"key":"e_1_3_2_2_23_1","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. https:\/\/people.csail.mit.edu\/vlk\/spectre11.pdf.  Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. https:\/\/people.csail.mit.edu\/vlk\/spectre11.pdf."},{"key":"e_1_3_2_2_24_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy.","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2018 . Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_25_1","volume-title":"USENIX Workshop On Offensive Technologies.","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh , Khaled N. Khasawneh , Chengyu Song , and Nael Abu-Ghazaleh . 2018 . Spectre Returns! Speculation Attacks using the Return Stack Buffer . In USENIX Workshop On Offensive Technologies. Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In USENIX Workshop On Offensive Technologies."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Jan Laukemann Julian Hammer Johannes Hofmann Georg Hager and Gerhard Wellein. 2018. Automated Instruction Stream Throughput Prediction for Intel and AMD Microarchitectures. https:\/\/arxiv.org\/abs\/1809.00912.  Jan Laukemann Julian Hammer Johannes Hofmann Georg Hager and Gerhard Wellein. 2018. Automated Instruction Stream Throughput Prediction for Intel and AMD Microarchitectures. https:\/\/arxiv.org\/abs\/1809.00912.","DOI":"10.1109\/PMBS.2018.8641578"},{"key":"e_1_3_2_2_27_1","volume-title":"USENIX Security Symposium.","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In USENIX Security Symposium. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In USENIX Security Symposium."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In Topics in Cryptology.  Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In Topics in Cryptology.","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_2_30_1","unstructured":"Michael Schwarz Martin Schwarzl Moritz Lipp and Daniel Gruss. 2018. NetSpectre: Read Arbitrary Memory over Network. https:\/\/arxiv.org\/abs\/1807.10535.  Michael Schwarz Martin Schwarzl Moritz Lipp and Daniel Gruss. 2018. NetSpectre: Read Arbitrary Memory over Network. https:\/\/arxiv.org\/abs\/1807.10535."},{"key":"e_1_3_2_2_31_1","unstructured":"Alexander Sotirov. 2009. Bypassing memory protections: The future of exploitation. In USENIX Security.  Alexander Sotirov. 2009. Bypassing memory protections: The future of exploitation. In USENIX Security."},{"key":"e_1_3_2_2_32_1","unstructured":"Linus Torvalds. 2018. Linus on Spectre\/Meltdown mitigations. https:\/\/lkml.org\/lkml\/2018\/1\/21\/192.  Linus Torvalds. 2018. Linus on Spectre\/Meltdown mitigations. https:\/\/lkml.org\/lkml\/2018\/1\/21\/192."},{"key":"e_1_3_2_2_33_1","volume-title":"Dag Arne Osvik, and Adi Shamir","author":"Tromer Eran","year":"2010","unstructured":"Eran Tromer , Dag Arne Osvik, and Adi Shamir . 2010 . Efficient Cache Attacks on AES, and Countermeasures. Journal of Cryptology ( 2010). Eran Tromer, Dag Arne Osvik, and Adi Shamir. 2010. Efficient Cache Attacks on AES, and Countermeasures. Journal of Cryptology (2010)."},{"key":"e_1_3_2_2_34_1","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886.  Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886."},{"key":"e_1_3_2_2_35_1","volume-title":"USENIX Security Symposium.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In USENIX Security Symposium. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC '06)","author":"Wang Zhenghong","year":"2006","unstructured":"Zhenghong Wang and Ruby B. Lee . 2006. Covert and Side Channels Due to Processor Architecture . In Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC '06) . IEEE Computer Society, Washington, DC, USA, 473--482. https:\/\/doi.org\/10.1109\/ACSAC. 2006 .20 10.1109\/ACSAC.2006.20 Zhenghong Wang and Ruby B. Lee. 2006. Covert and Side Channels Due to Processor Architecture. In Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC '06). IEEE Computer Society, Washington, DC, USA, 473--482. https:\/\/doi.org\/10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_2_37_1","volume-title":"USENIX Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack . In USENIX Security Symposium. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack. In USENIX Security Symposium."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363194"}},"subtitle":["Exploiting Speculative Execution through Port Contention"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":38,"alternative-id":["10.1145\/3319535.3363194","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363194","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}