{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:55:20Z","timestamp":1765356920066,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3447852.3458715","type":"proceedings-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:54:20Z","timestamp":1619344460000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Reproducing Spectre Attack with gem5"],"prefix":"10.1145","author":[{"given":"Pierre","family":"Ayoub","sequence":"first","affiliation":[{"name":"EURECOM Sophia Antipolis, France"}]},{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[{"name":"Univ Lille, CNRS, Inria Lille, France"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Wood","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert , Bradford Beckmann , Gabriel Black , Steven K. Reinhardt , Ali Saidi , Arkaprava Basu , Joel Hestness , Derek R. Hower , Tushar Krishna , Somayeh Sardashti , Rathijit Sen , Korey Sewell , Muhammad Shoaib , Nilay Vaish , Mark D. Hill , and David A . Wood . 2011 . The Gem5 Simulator. SIGARCH Comput. Archit. News ( 2011). Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven K. Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek R. Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark D. Hill, and David A. Wood. 2011. The Gem5 Simulator. SIGARCH Comput. Archit. News (2011)."},{"volume-title":"Michael Schwarz, Moritz Lipp","author":"Canella Claudio","key":"e_1_3_2_1_2_1","unstructured":"Claudio Canella , Jo Van Bulck , Michael Schwarz, Moritz Lipp , Benjamin Von Berg , Philipp Ortner , Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. [n.d.]. TransientFail Repository. IAIK. https:\/\/github.com\/IAIK\/transientfail Consulted on 2020--08--30. Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin Von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. [n.d.]. TransientFail Repository. IAIK. https:\/\/github.com\/IAIK\/transientfail Consulted on 2020--08--30."},{"key":"e_1_3_2_1_3_1","volume-title":"Michael Schwarz, Moritz Lipp, Benjamin von","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella , Jo Van Bulck , Michael Schwarz, Moritz Lipp, Benjamin von Berg , Philipp Ortner , Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019 . A Systematic Evaluation of Transient Execution Attacks and Defenses. In USENIX Security. Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. In USENIX Security."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Fernando A Endo Damien Courouss\u00e9 and Henri-Pierre Charles. 2014. Micro-Architectural Simulation of In-Order and Out-Of-Order ARM Microprocessors with Gem5 (SAMOS XIV). CEA.  Fernando A Endo Damien Courouss\u00e9 and Henri-Pierre Charles. 2014. Micro-Architectural Simulation of In-Order and Out-Of-Order ARM Microprocessors with Gem5 (SAMOS XIV). CEA.","DOI":"10.1109\/SAMOS.2014.6893220"},{"key":"e_1_3_2_1_5_1","unstructured":"Daniel Gruss Raphael Spreitzer and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security.  Daniel Gruss Raphael Spreitzer and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Anthony Gutierrez Joseph Pusdesris Ronald G. Dreslinski Trevor Mudge Chander Sudanthi Christopher Emmons Mitch Hayenga and Nigel Charles Paver. 2014. Sources of Error in Full-System Simulation (ISPASS).  Anthony Gutierrez Joseph Pusdesris Ronald G. Dreslinski Trevor Mudge Chander Sudanthi Christopher Emmons Mitch Hayenga and Nigel Charles Paver. 2014. Sources of Error in Full-System Simulation (ISPASS).","DOI":"10.1109\/ISPASS.2014.6844457"},{"key":"e_1_3_2_1_7_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution (S&P).","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution (S&P). Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution (S&P)."},{"key":"e_1_3_2_1_8_1","unstructured":"Chris Lamb Holger Levsen Mattia Rizzolo and Vagrant Cascadian. [n.d.]. Reproducible Builds. https:\/\/reproducible-builds.org\/  Chris Lamb Holger Levsen Mattia Rizzolo and Vagrant Cascadian. [n.d.]. Reproducible Builds. https:\/\/reproducible-builds.org\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Mudge","author":"Lee Chih-Chieh","year":"1997","unstructured":"Chih-Chieh Lee , I- Cheng K. Chen , and Trevor N . Mudge . 1997 . The Bi-Mode Branch Predictor. In MICRO. Chih-Chieh Lee, I-Cheng K. Chen, and Trevor N. Mudge. 1997. The Bi-Mode Branch Predictor. In MICRO."},{"key":"e_1_3_2_1_10_1","unstructured":"Moritz Lipp Daniel Gruss Raphael Spreitzer Cl\u00e9mentine Maurice and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security).  Moritz Lipp Daniel Gruss Raphael Spreitzer Cl\u00e9mentine Maurice and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security)."},{"key":"e_1_3_2_1_11_1","volume-title":"Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci.","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin , Ian Neal , Jiacheng Ma Ma , Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021 . DOLMA : Securing Speculation with the Principle of Transient Non-Observability. In USENIX Security . Kevin Loughlin, Ian Neal, Jiacheng Ma Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021. DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In USENIX Security."},{"key":"e_1_3_2_1_12_1","unstructured":"Jason Lowe-Power. [n.d.]. Visualizing Spectre with gem5. http:\/\/www.lowepower.com\/jason\/visualizing-spectre-with-gem5.html  Jason Lowe-Power. [n.d.]. Visualizing Spectre with gem5. http:\/\/www.lowepower.com\/jason\/visualizing-spectre-with-gem5.html"},{"key":"e_1_3_2_1_13_1","volume-title":"A Survey of Techniques for Dynamic Branch Prediction. CCPE","author":"Mittal Sparsh","year":"2016","unstructured":"Sparsh Mittal . 2016. A Survey of Techniques for Dynamic Branch Prediction. CCPE ( 2016 ). Sparsh Mittal. 2016. A Survey of Techniques for Dynamic Branch Prediction. CCPE (2016)."},{"key":"e_1_3_2_1_14_1","unstructured":"Ryota Shioya. [n.d.]. Visualizing the out-of-order CPU model. http:\/\/learning.gem5.org\/tutorial\/presentations\/vis-o3-gem5.pdf  Ryota Shioya. [n.d.]. Visualizing the out-of-order CPU model. http:\/\/learning.gem5.org\/tutorial\/presentations\/vis-o3-gem5.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"James E. Smith. 1998. A Study of Branch Prediction Strategies (ISCA).  James E. Smith. 1998. A Study of Branch Prediction Strategies (ISCA).","DOI":"10.1145\/285930.285980"},{"key":"e_1_3_2_1_16_1","unstructured":"Linus Torvalds. [n.d.]. Spectre Side Channels. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/hw-vuln\/spectre.html Consulted on 2020--09--06.  Linus Torvalds. [n.d.]. Spectre Side Channels. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/hw-vuln\/spectre.html Consulted on 2020--09--06."},{"key":"e_1_3_2_1_17_1","unstructured":"Vincent M. Weaver. [n.d.]. Linux perf event Features and Overhead. http:\/\/web.eece.maine.edu\/~vweaver\/projects\/perf_events\/ Consulted on 2021--02--05.  Vincent M. Weaver. [n.d.]. Linux perf event Features and Overhead. http:\/\/web.eece.maine.edu\/~vweaver\/projects\/perf_events\/ Consulted on 2021--02--05."},{"key":"e_1_3_2_1_18_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution Low Noise L3 Cache Side-Channel Attack. In USENIX Security.  Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution Low Noise L3 Cache Side-Channel Attack. In USENIX Security."},{"key":"e_1_3_2_1_19_1","volume-title":"Patt","author":"Yeh Tse-Yu","year":"1991","unstructured":"Tse-Yu Yeh and Yale N . Patt . 1991 . Two-Level Adaptive Training Branch Prediction (MICRO) . Tse-Yu Yeh and Yale N. Patt. 1991. Two-Level Adaptive Training Branch Prediction (MICRO)."}],"event":{"name":"EuroSys '21: Sixteenth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Online United Kingdom","acronym":"EuroSys '21"},"container-title":["Proceedings of the 14th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447852.3458715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:27Z","timestamp":1750268967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458715"}},"subtitle":["How To Do It Right?"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":19,"alternative-id":["10.1145\/3447852.3458715","10.1145\/3447852"],"URL":"https:\/\/doi.org\/10.1145\/3447852.3458715","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}