{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:57Z","timestamp":1772725617122,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["FKZ: 13N1S0762"],"award-info":[{"award-number":["FKZ: 13N1S0762"]}]},{"name":"Community of Madrid","award":["S2018\/TCS-4339 BLOQUES"],"award-info":[{"award-number":["S2018\/TCS-4339 BLOQUES"]}]},{"name":"Spanish Ministry of Science, Innovation, and University","award":["RTI2018-102043-B-I00 SCUM"],"award-info":[{"award-number":["RTI2018-102043-B-I00 SCUM"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484534","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"445-461","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Exorcising Spectres with Secure Compilers"],"prefix":"10.1145","author":[{"given":"Marco","family":"Patrignani","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"}]},{"given":"Marco","family":"Guarnieri","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646252.686313"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243745"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44914-8_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00025"},{"key":"e_1_3_2_1_5_1","unstructured":"Advanced Micro Devices Inc. 2018. Software techniques for managing speculation on AMD processors. https: \/\/developer.amd.com\/wp- content\/resources\/90343-B_SotwareTechniquesforManagingSpeculation_WP_7- 18Update_FNL.pdf ."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48288-9_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134078"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security). USENIX Association.","author":"Almeida Jos\u00e9 Bacelar","year":"2016","unstructured":"Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Francc ois Dupressoir, and Michael Emmi. 2016. Verifying constant-time implementations. In Proceedings of the 25th USENIX Security Symposium (USENIX Security). USENIX Association."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM.","author":"Balliu Musard","year":"2020","unstructured":"Musard Balliu, Mads Dam, and Roberto Guanciale. 2020. InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371075"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129511000193"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00031"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming (ICFP). ACM.","author":"William","unstructured":"William J. Bowman and Amal Ahmed. 2015. Noninterference for free. In Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming (ICFP). ACM."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00026"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association.","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. In Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association."},{"key":"e_1_3_2_1_16_1","unstructured":"Chandler Carruth. 2018. Speculative Load Hardening. https:\/\/llvm.org\/docs\/SpeculativeLoadHardening.html ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385970"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00027"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P). IEEE.","author":"Chen Guoxing","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2019. Stealing Intel Secrets from SGX Enclaves via Speculative Execution. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P). IEEE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837618"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275497.1275500"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429114"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2003-11402"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P). IEEE.","author":"Guarnieri Marco","year":"2020","unstructured":"Marco Guarnieri, Boris K\u00f6pf, Jos\u00e9 F. Morales, Jan Reineke, and Andr\u00e9s S\u00e1nchez. 2020. textscSpectector: Principled detection of speculative information flows. In Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P). IEEE."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00036"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_30_1","unstructured":"Jann Horn. 2019. Google Project zero - Issue 1528: speculative execution variant 4: speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528 ."},{"key":"e_1_3_2_1_31_1","unstructured":"Intel. 2018a. Intel Analysis of Speculative Execution Side Channels. https:\/\/software.intel.com\/sites\/default\/files\/managed\/b9\/f9\/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf ."},{"key":"e_1_3_2_1_32_1","volume-title":"Retpoline: A Branch Target Injection Mitigation. https:\/\/software.intel.com\/security-software-guidance\/api-app\/sites\/default\/files\/Retpoline-A-Branch-Target-Injection-Mitigation.pdf .","year":"2018","unstructured":"Intel. 2018b. Retpoline: A Branch Target Injection Mitigation. https:\/\/software.intel.com\/security-software-guidance\/api-app\/sites\/default\/files\/Retpoline-A-Branch-Target-Injection-Mitigation.pdf ."},{"key":"e_1_3_2_1_33_1","unstructured":"Intel. 2018c. Using Intel Compilers to Mitigate Speculative Execution Side-Channel Issues. https:\/\/software.intel.com\/en-us\/articles\/using-intel-compilers-to-mitigate-speculative-execution-side-channel-issues ."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF). IEEE.","author":"Juglaret Yannis","unstructured":"Yannis Juglaret, Cuatualin Hrictcu, Arthur Azevedo de Amorim, Boris Eng, and Benjamin C. Pierce. 2016. Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. In Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF). IEEE."},{"key":"e_1_3_2_1_35_1","volume-title":"Speculative Buffer Overflows: Attacks and Defenses. CoRR","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. CoRR, Vol. abs\/1807.03757 (2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"Paul Kocher. 2018. Spectre Mitigations in Microsoft's C\/C+ Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html ."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association.","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009--9155--4"},{"key":"e_1_3_2_1_40_1","volume-title":"Gordon","author":"Maffeis Sergio","year":"2008","unstructured":"Sergio Maffeis, Mart\u00edn Abadi, C\u00e9dric Fournet, and Andrew D. Gordon. 2008. Code-Carrying Authorization. In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Springer."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Andrea Mambretti Matthias Neugschwandtner Alessandro Sorniotti Engin Kirda William Robertson and Anil Kurmus. 2018. Let's Not Speculate: Discovering and Analyzing Speculative Execution Attacks. In IBM Technical Report RZ3933.","DOI":"10.1145\/3359789.3359837"},{"key":"e_1_3_2_1_43_1","volume-title":"Spectre is here to stay: An analysis of side-channels and speculative execution. CoRR","author":"Mcilroy Ross","year":"2019","unstructured":"Ross Mcilroy, Jaroslav Sevcik, Tobias Tebbi, Ben L. Titzer, and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. CoRR, Vol. abs\/1902.05178 (2019)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC). Springer.","author":"Molnar David","year":"2005","unstructured":"David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In Proceedings of the 8th International Conference on Information Security and Cryptology (ICISC). Springer."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2951941"},{"key":"e_1_3_2_1_46_1","volume-title":"You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass. CoRR","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Tobias Reiher, Mark Silberstein, and Christof Fetzer. 2018. You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass. CoRR, Vol. abs\/1805.08506 (2018)."},{"key":"e_1_3_2_1_47_1","unstructured":"Andrew Pardoe. 2018. Spectre mitigations in MSVC. https:\/\/blogs.msdn.microsoft.com\/vcblog\/2018\/01\/15\/spectre-mitigations-in-msvc\/."},{"key":"e_1_3_2_1_48_1","volume-title":"Syntax Highlighting Beyond Code Snippets. CoRR","author":"Patrignani Marco","year":"2020","unstructured":"Marco Patrignani. 2020. Why Should Anyone use Colours? or, Syntax Highlighting Beyond Code Snippets. CoRR (2020)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699503"},{"key":"e_1_3_2_1_50_1","volume-title":"Comput. Surveys","volume":"51","author":"Patrignani Marco","year":"2019","unstructured":"Marco Patrignani, Amal Ahmed, and Dave Clarke. 2019. Formal Approaches to Secure Compilation A Survey of Fully Abstract Compilation and Related Work. Comput. Surveys, Vol. 51, 6 (2019)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436809"},{"key":"e_1_3_2_1_52_1","volume-title":"Exorcising Spectres with Secure Compilers. CoRR","author":"Patrignani Marco","year":"2020","unstructured":"Marco Patrignani and Marco Guarnieri. 2020. Exorcising Spectres with Secure Compilers. CoRR, Vol. abs\/1910.08607 (2020)."},{"key":"e_1_3_2_1_53_1","unstructured":"Filip Pizlo. 2018. What Spectre and Meltdown mean for WebKit. https:\/\/webkit.org\/blog\/8048\/what-spectre-and-meltdown-mean-for-webkit\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.18"},{"key":"e_1_3_2_1_55_1","volume-title":"FOSSACS '18","author":"Scherer Gabriel","year":"2018","unstructured":"Gabriel Scherer, Max New, Nick Rioux, and Amal Ahmed. 2018. Fabous Interoperability for ML and a Linear Language. In FOSSACS '18. 146--162."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.14"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363519"},{"key":"e_1_3_2_1_59_1","volume-title":"LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels. CoRR","author":"Stecklina Julian","year":"2018","unstructured":"Julian Stecklina and Thomas Prescher. 2018. LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels. CoRR, Vol. abs\/1806.07480 (2018)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133913"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_24"},{"key":"e_1_3_2_1_62_1","volume-title":"MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols. CoRR","author":"Trippel Caroline","year":"2018","unstructured":"Caroline Trippel, Daniel Lustig, and Margaret Martonosi. 2018. MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols. CoRR, Vol. abs\/1802.03802 (2018)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434330"},{"key":"e_1_3_2_1_65_1","volume-title":"oo7: Low-overhead Defense against Spectre Attacks via Binary Analysis. CoRR","author":"Wang Guanhua","year":"2018","unstructured":"Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, and Abhik Roychoudhury. 2018. oo7: Low-overhead Defense against Spectre Attacks via Binary Analysis. CoRR, Vol. abs\/1807.05843 (2018)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:16Z","timestamp":1763499196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":65,"alternative-id":["10.1145\/3460120.3484534","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484534","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}