{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:45:55Z","timestamp":1772725555742,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["2005\/17"],"award-info":[{"award-number":["2005\/17"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["SCAP ISRA"],"award-info":[{"award-number":["SCAP ISRA"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS #1816226, CNS #1942888, CNS #1954521"],"award-info":[{"award-number":["CNS #1816226, CNS #1942888, CNS #1954521"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1145\/3466752.3480068","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T19:16:55Z","timestamp":1634498215000},"page":"607-622","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy"],"prefix":"10.1145","author":[{"given":"Rutvik","family":"Choudhary","sequence":"first","affiliation":[{"name":"University of Illinois--Urbana Champaign"}]},{"given":"Jiyong","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois--Urbana Champaign, United States of America"}]},{"given":"Christopher","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois--Urbana Champaign, United States of America"}]},{"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SPEC CPU2017","year":"2017","unstructured":"2017. SPEC CPU2017 . https:\/\/www.spec.org\/cpu 2017 . 2017. SPEC CPU2017. https:\/\/www.spec.org\/cpu2017."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. InvisiSpec-1.0 simulator bug fix. https:\/\/github.com\/mjyan0720\/InvisiSpec-1.0\/commit\/f29164ba510b92397a26d8958fd87c0a2b636b0c.  2019. InvisiSpec-1.0 simulator bug fix. https:\/\/github.com\/mjyan0720\/InvisiSpec-1.0\/commit\/f29164ba510b92397a26d8958fd87c0a2b636b0c."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Bitslice AES (Bitcoin). https:\/\/github.com\/bitcoin-core\/ctaes.  2020. Bitslice AES (Bitcoin). https:\/\/github.com\/bitcoin-core\/ctaes."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. ChaCha20 (BearSSL). https:\/\/bearssl.org\/gitweb\/.  2021. ChaCha20 (BearSSL). https:\/\/bearssl.org\/gitweb\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Onur Ac\u0131i\u00e7mez \u00c7etin\u00a0Kaya Ko\u00e7 and Jean-Pierre Seifert. 2007. Predicting Secret Keys via Branch Prediction. In CT-RSA \u201907.  Onur Ac\u0131i\u00e7mez \u00c7etin\u00a0Kaya Ko\u00e7 and Jean-Pierre Seifert. 2007. Predicting Secret Keys via Branch Prediction. In CT-RSA \u201907.","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_6_1","volume-title":"Obliviate: A Data Oblivious Filesystem for Intel SGX. In NDSS \u201918.","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad , KyungTae Kim , Muhammad\u00a0Ihsanulhaq Sarfaraz , and Byoungyoung Lee . 2018 . Obliviate: A Data Oblivious Filesystem for Intel SGX. In NDSS \u201918. Adil Ahmad, KyungTae Kim, Muhammad\u00a0Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. Obliviate: A Data Oblivious Filesystem for Intel SGX. In NDSS \u201918."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Sam Ainsworth and Timothy\u00a0M. Jones. 2020. MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State. In ISCA \u201920.  Sam Ainsworth and Timothy\u00a0M. Jones. 2020. MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State. In ISCA \u201920.","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"e_1_3_2_1_8_1","volume-title":"Cesar\u00a0Pereida Garc\u00eda, and Nicola Tuveri.","author":"Aldaya Alejandro\u00a0Cabrera","year":"2019","unstructured":"Alejandro\u00a0Cabrera Aldaya , Billy\u00a0Bob Brumley , Sohaib ul Hassan , Cesar\u00a0Pereida Garc\u00eda, and Nicola Tuveri. 2019 . Port Contention for Fun and Profit. IEEE S &P \u201919. Alejandro\u00a0Cabrera Aldaya, Billy\u00a0Bob Brumley, Sohaib ul Hassan, Cesar\u00a0Pereida Garc\u00eda, and Nicola Tuveri. 2019. Port Contention for Fun and Profit. IEEE S&P \u201919."},{"key":"e_1_3_2_1_9_1","unstructured":"Jose\u00a0Bacelar Almeida Manuel Barbosa Gilles Barthe Fran\u00e7ois Dupressoir and Michael Emmi. 2016. Verifying Constant-Time Implementations. In USENIX Security \u201916.  Jose\u00a0Bacelar Almeida Manuel Barbosa Gilles Barthe Fran\u00e7ois Dupressoir and Michael Emmi. 2016. Verifying Constant-Time Implementations. In USENIX Security \u201916."},{"key":"e_1_3_2_1_10_1","volume-title":"On Subnormal Floating Point and Abnormal Timing","author":"Andrysco Marc","unstructured":"Marc Andrysco , David Kohlbrenner , Keaton Mowery , Ranjit Jhala , Sorin Lerner , and Hovav Shacham . 2015. On Subnormal Floating Point and Abnormal Timing . In IEEE S &P \u201915. Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, and Hovav Shacham. 2015. On Subnormal Floating Point and Abnormal Timing. In IEEE S&P \u201915."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kristin Barber Anys Bacha Li Zhou Yinqian Zhang and Radu Teodorescu. 2019. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. In PACT \u201919.  Kristin Barber Anys Bacha Li Zhou Yinqian Zhang and Radu Teodorescu. 2019. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. In PACT \u201919.","DOI":"10.1109\/PACT.2019.00020"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Mohammad Behnia Prateek Sahu Riccardo Paccagnella Jiyong Yu Zirui Zhao Xiang Zou Thomas Unterluggauer Josep Torrellas Carlos Rozas Adam Morrison Frank Mckeen Fangfei Liu Ron Gabor Christopher\u00a0W. Fletcher Abhishek Basak and Alaa Alameldeen. 2021. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. In ASPLOS \u201921.  Mohammad Behnia Prateek Sahu Riccardo Paccagnella Jiyong Yu Zirui Zhao Xiang Zou Thomas Unterluggauer Josep Torrellas Carlos Rozas Adam Morrison Frank Mckeen Fangfei Liu Ron Gabor Christopher\u00a0W. Fletcher Abhishek Basak and Alaa Alameldeen. 2021. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. In ASPLOS \u201921.","DOI":"10.1145\/3445814.3446708"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J. Bernstein. 2005. The Poly1305-AES Message-Authentication Code. In FSE \u201905.  Daniel\u00a0J. Bernstein. 2005. The Poly1305-AES Message-Authentication Code. In FSE \u201905.","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In PKC \u201906.  Daniel\u00a0J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In PKC \u201906.","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_15_1","unstructured":"Daniel\u00a0J. Bernstein. 2019. djbsort. https:\/\/sorting.cr.yp.to\/.  Daniel\u00a0J. Bernstein. 2019. djbsort. https:\/\/sorting.cr.yp.to\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Atri Bhattacharyya Alexandra Sandulescu Matthias Neugschwandtner Alessandro Sorniotti Babak Falsafi Mathias Payer and Anil Kurmus. 2019. SMoTherSpectre: Exploiting Speculative Execution through Port Contention. In CCS \u201919.  Atri Bhattacharyya Alexandra Sandulescu Matthias Neugschwandtner Alessandro Sorniotti Babak Falsafi Mathias Payer and Anil Kurmus. 2019. SMoTherSpectre: Exploiting Speculative Execution through Port Contention. In CCS \u201919.","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_17_1","volume-title":"The Gem5 Simulator. ACM SIGARCH Computer Architecture News2","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert , Bradford Beckmann , Gabriel Black , Steven\u00a0 K Reinhardt , Ali Saidi , Arkaprava Basu , Joel Hestness , Derek\u00a0 R Hower , Tushar Krishna , Somayeh Sardashti , Rathijit Sen , Korey Sewell , Muhammad Shoaib , Nilay Vaish , Mark\u00a0 D. Hill , and David\u00a0 A. Wood . 2011. The Gem5 Simulator. ACM SIGARCH Computer Architecture News2 ( 2011 ), 1\u20137. Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven\u00a0K Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek\u00a0R Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark\u00a0D. Hill, and David\u00a0A. Wood. 2011. The Gem5 Simulator. ACM SIGARCH Computer Architecture News2 (2011), 1\u20137."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Thomas Bourgeat Ilia Lebedev Andrew Wright Sizhuo Zhang Arvind and Srinivas Devadas. 2019. MI6: Secure Enclaves in a Speculative Out-of-Order Processor. In MICRO \u201919.  Thomas Bourgeat Ilia Lebedev Andrew Wright Sizhuo Zhang Arvind and Srinivas Devadas. 2019. MI6: Secure Enclaves in a Speculative Out-of-Order Processor. In MICRO \u201919.","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Sunjay Cauligi Craig Disselkoen Klaus\u00a0v. Gleissenthall Dean Tullsen Deian Stefan Tamara Rezk and Gilles Barthe. 2020. Constant-Time Foundations for the New Spectre Era. In PLDI \u201920.  Sunjay Cauligi Craig Disselkoen Klaus\u00a0v. Gleissenthall Dean Tullsen Deian Stefan Tamara Rezk and Gilles Barthe. 2020. Constant-Time Foundations for the New Spectre Era. In PLDI \u201920.","DOI":"10.1145\/3385412.3385970"},{"key":"e_1_3_2_1_20_1","volume-title":"Constant-Time Programming Language","author":"Cauligi Sunjay","unstructured":"Sunjay Cauligi , Gary Soeller , Fraser Brown , Brian Johannesmeyer , Yunlu Huang , Ranjit Jhala , and Deian Stefan . 2017. FaCT : A Flexible , Constant-Time Programming Language . In IEEE SecDev \u201917. Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, and Deian Stefan. 2017. FaCT: A Flexible, Constant-Time Programming Language. In IEEE SecDev \u201917."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Kevin Cheang Cameron Rasmussen Sanjit\u00a0A. Seshia and Pramod Subramanyan. 2019. A Formal Approach to Secure Speculation. In CSF\u201919.  Kevin Cheang Cameron Rasmussen Sanjit\u00a0A. Seshia and Pramod Subramanyan. 2019. A Formal Approach to Secure Speculation. In CSF\u201919.","DOI":"10.1109\/CSF.2019.00027"},{"key":"e_1_3_2_1_22_1","volume-title":"SgxPectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution","author":"Chen Guoxing","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten\u00a0 H. Lai . 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution . In IEEE EuroS &P \u201919. Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten\u00a0H. Lai. 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution. In IEEE EuroS&P \u201919."},{"key":"e_1_3_2_1_23_1","volume-title":"Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors","author":"Coppens Bart","unstructured":"Bart Coppens , Ingrid Verbauwhede , Koen\u00a0De Bosschere , and Bjorn\u00a0De Sutter . 2009. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors . In IEEE S &P\u201909. Bart Coppens, Ingrid Verbauwhede, Koen\u00a0De Bosschere, and Bjorn\u00a0De Sutter. 2009. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. In IEEE S&P\u201909."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Dmitry Evtyushkin and Dmitry Ponomarev. 2016. Covert Channels Through Random Number Generator: Mechanisms Capacity Estimation and Mitigations. In CCS \u201916.  Dmitry Evtyushkin and Dmitry Ponomarev. 2016. Covert Channels Through Random Number Generator: Mechanisms Capacity Estimation and Mitigations. In CCS \u201916.","DOI":"10.1145\/2976749.2978374"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Dmitry Evtyushkin Ryan Riley Nael Abu-Ghazaleh and Dmitry Ponomarev. 2018. BranchScope: A New Side-Channel Attack on Directional Branch Predictor. In ASPLOS \u201918.  Dmitry Evtyushkin Ryan Riley Nael Abu-Ghazaleh and Dmitry Ponomarev. 2018. BranchScope: A New Side-Channel Attack on Directional Branch Predictor. In ASPLOS \u201918.","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_1_28_1","volume-title":"Iron: Functional Encryption using Intel SGX. In CCS \u201917.","author":"Fisch A.","year":"2017","unstructured":"Ben\u00a0 A. Fisch , Dhinakaran Vinayagamurthy , Dan Boneh , and Sergey Gorbunov . 2017 . Iron: Functional Encryption using Intel SGX. In CCS \u201917. Ben\u00a0A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. 2017. Iron: Functional Encryption using Intel SGX. In CCS \u201917."},{"key":"e_1_3_2_1_29_1","unstructured":"Ben Gras Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security \u201918.  Ben Gras Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security \u201918."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Johann Gro\u00dfsch\u00e4dl Elisabeth Oswald Dan Page and Michael Tunstall. 2009. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. In ICISC \u201909.  Johann Gro\u00dfsch\u00e4dl Elisabeth Oswald Dan Page and Michael Tunstall. 2009. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. In ICISC \u201909.","DOI":"10.1007\/978-3-642-14423-3_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Anders Fogh Moritz Lipp and Stefan Mangard. 2016. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. In CCS \u201916.  Daniel Gruss Cl\u00e9mentine Maurice Anders Fogh Moritz Lipp and Stefan Mangard. 2016. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. In CCS \u201916.","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Roberto Guanciale Musard Balliu and Mads Dam. 2020. InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. In CCS \u201920.  Roberto Guanciale Musard Balliu and Mads Dam. 2020. InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. In CCS \u201920.","DOI":"10.1145\/3372297.3417246"},{"key":"e_1_3_2_1_33_1","volume-title":"Spectector: Principled Detection of Speculative Information Flows","author":"Guarnieri Marco","year":"2020","unstructured":"Marco Guarnieri , Boris K\u00f6pf , Jos\u00e9\u00a0 F. Morales , Jan Reineke , and Andr\u00e9s S\u00e1nchez . 2020 . Spectector: Principled Detection of Speculative Information Flows . In IEEE S &P \u201920. Marco Guarnieri, Boris K\u00f6pf, Jos\u00e9\u00a0F. Morales, Jan Reineke, and Andr\u00e9s S\u00e1nchez. 2020. Spectector: Principled Detection of Speculative Information Flows. In IEEE S&P \u201920."},{"key":"e_1_3_2_1_34_1","volume-title":"Hardware-Software Contracts for Secure Speculation","author":"Guarnieri Marco","unstructured":"Marco Guarnieri , Boris K\u00f6pf , Jan Reineke , and Pepe Vila . 2021. Hardware-Software Contracts for Secure Speculation . In IEEE S &P \u201921. Marco Guarnieri, Boris K\u00f6pf, Jan Reineke, and Pepe Vila. 2021. Hardware-Software Contracts for Secure Speculation. In IEEE S&P \u201921."},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient Software Implementations of Modular Exponentiation. Journal of Cryptographic Engineering 2","author":"Gueron Shay","year":"2012","unstructured":"Shay Gueron . 2012. Efficient Software Implementations of Modular Exponentiation. Journal of Cryptographic Engineering 2 ( 2012 ). Issue 1. Shay Gueron. 2012. Efficient Software Implementations of Modular Exponentiation. Journal of Cryptographic Engineering 2 (2012). Issue 1."},{"key":"e_1_3_2_1_36_1","volume-title":"Computer Architecture","author":"Hennessy L.","unstructured":"John\u00a0 L. Hennessy and David\u00a0 A. Patterson . 2017. Computer Architecture , Sixth Edition : A Quantitative Approach (6th ed.). Morgan Kaufmann Publishers Inc . John\u00a0L. Hennessy and David\u00a0A. Patterson. 2017. Computer Architecture, Sixth Edition: A Quantitative Approach (6th ed.). Morgan Kaufmann Publishers Inc."},{"key":"e_1_3_2_1_37_1","unstructured":"Jann Horn. 2018. Speculative execution variant 4: speculative store bypass. https:\/\/eprint.iacr.org\/2018\/808.  Jann Horn. 2018. Speculative execution variant 4: speculative store bypass. https:\/\/eprint.iacr.org\/2018\/808."},{"key":"e_1_3_2_1_38_1","volume-title":"Superscalar Microprocessor Design","author":"Johnson Mike","unstructured":"Mike Johnson . 1991. Superscalar Microprocessor Design . Prentice Hall Englewood Cliffs , New Jersey . Mike Johnson. 1991. Superscalar Microprocessor Design. Prentice Hall Englewood Cliffs, New Jersey."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Khaled\u00a0N. Khasawneh Esmaeil\u00a0Mohammadian Koruyeh Chengyu Song Dmitry Evtyushkin Dmitry Ponomarev and Nael\u00a0B. Abu-Ghazaleh. 2019. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. In DAC \u201919.  Khaled\u00a0N. Khasawneh Esmaeil\u00a0Mohammadian Koruyeh Chengyu Song Dmitry Evtyushkin Dmitry Ponomarev and Nael\u00a0B. Abu-Ghazaleh. 2019. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. In DAC \u201919.","DOI":"10.1145\/3316781.3317903"},{"key":"e_1_3_2_1_40_1","volume-title":"DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO \u201918.","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky , Ilia\u00a0 A. Lebedev , Saman\u00a0 P. Amarasinghe , Srinivas Devadas , and Joel Emer . 2018 . DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO \u201918. Vladimir Kiriansky, Ilia\u00a0A. Lebedev, Saman\u00a0P. Amarasinghe, Srinivas Devadas, and Joel Emer. 2018. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO \u201918."},{"key":"e_1_3_2_1_41_1","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. arxiv:1807.03757\u00a0[cs.CR]  Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. arxiv:1807.03757\u00a0[cs.CR]"},{"key":"e_1_3_2_1_42_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution . In IEEE S &P \u201919. Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE S&P \u201919."},{"key":"e_1_3_2_1_43_1","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh Khaled\u00a0N. Khasawneh Chengyu Song and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In WOOT \u201918.  Esmaeil\u00a0Mohammadian Koruyeh Khaled\u00a0N. Khasawneh Chengyu Song and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In WOOT \u201918."},{"key":"e_1_3_2_1_44_1","volume-title":"Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA \u201919.","author":"Li Peinan","year":"2019","unstructured":"Peinan Li , Lutan Zhao , Rui Hou , Lixin Zhang , and Dan Meng . 2019 . Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA \u201919. Peinan Li, Lutan Zhao, Rui Hou, Lixin Zhang, and Dan Meng. 2019. Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA \u201919."},{"key":"e_1_3_2_1_45_1","volume-title":"Last-Level Cache Side-Channel Attacks are Practical","author":"Liu F.","unstructured":"F. Liu , Y. Yarom , Q. Ge , G. Heiser , and R.\u00a0 B. Lee . 2015. Last-Level Cache Side-Channel Attacks are Practical . In IEEE S &P \u201915. F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R.\u00a0B. Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical. In IEEE S&P \u201915."},{"key":"e_1_3_2_1_46_1","volume-title":"DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In USENIX Security \u201921.","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin , Ian Neal , Jiacheng Ma , Elisa Tsai , Ofir Weisse , Satish Narayanasamy , and Baris Kasikci . 2021 . DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In USENIX Security \u201921. Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021. DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In USENIX Security \u201921."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Giorgi Maisuradze and Christian Rossow. 2018. Ret2Spec: Speculative Execution Using Return Stack Buffers. In CCS \u201918.  Giorgi Maisuradze and Christian Rossow. 2018. Ret2Spec: Speculative Execution Using Return Stack Buffers. In CCS \u201918.","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_48_1","unstructured":"Ross Mcilroy Jaroslav Sevcik Tobias Tebbi Ben\u00a0L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. arxiv:1902.05178\u00a0[cs.PL]  Ross Mcilroy Jaroslav Sevcik Tobias Tebbi Ben\u00a0L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. arxiv:1902.05178\u00a0[cs.PL]"},{"key":"e_1_3_2_1_49_1","volume-title":"Oblix: An Efficient Oblivious Search Index","author":"Mishra P.","year":"2018","unstructured":"P. Mishra , R. Poddar , J. Chen , A. Chiesa , and R.\u00a0 A. Popa . 2018 . Oblix: An Efficient Oblivious Search Index . In IEEE S &P\u201918. P. Mishra, R. Poddar, J. Chen, A. Chiesa, and R.\u00a0A. Popa. 2018. Oblix: An Efficient Oblivious Search Index. In IEEE S&P\u201918."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0611-9"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"David Molnar Matt Piotrowski David Schultz and David Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ICISC \u201905.  David Molnar Matt Piotrowski David Schultz and David Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ICISC \u201905.","DOI":"10.1007\/11734727_14"},{"key":"e_1_3_2_1_52_1","unstructured":"Olga Ohrimenko Felix Schuster Cedric Fournet Aastha Mehta Sebastian Nowozin Kapil Vaswani and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security \u201916.  Olga Ohrimenko Felix Schuster Cedric Fournet Aastha Mehta Sebastian Nowozin Kapil Vaswani and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security \u201916."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Dag\u00a0Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In CT-RSA \u201906.  Dag\u00a0Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In CT-RSA \u201906.","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_54_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security \u201916.","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security \u201916. Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security \u201916."},{"key":"e_1_3_2_1_55_1","volume-title":"Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security \u201915.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security \u201915. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security \u201915."},{"key":"e_1_3_2_1_56_1","unstructured":"Glenn Reinman and Brad Calder. 1998. Predictive Techniques for Aggressive Load Speculation. In MICRO \u201998.  Glenn Reinman and Brad Calder. 1998. Predictive Techniques for Aggressive Load Speculation. In MICRO \u201998."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0352"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Gururaj Saileshwar and Moinuddin\u00a0K. Qureshi. 2019. CleanupSpec: An \u201dUndo\u201d Approach to Safe Speculation. In MICRO \u201919.  Gururaj Saileshwar and Moinuddin\u00a0K. Qureshi. 2019. CleanupSpec: An \u201dUndo\u201d Approach to Safe Speculation. In MICRO \u201919.","DOI":"10.1145\/3352460.3358314"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Christos Sakalis Stefanos Kaxiras Alberto Ros Alexandra Jimborean and Magnus Sj\u00e4lander. 2019. Efficient Invisible Speculative Execution Through Selective Delay and Value Prediction. In ISCA \u201919.  Christos Sakalis Stefanos Kaxiras Alberto Ros Alexandra Jimborean and Magnus Sj\u00e4lander. 2019. Efficient Invisible Speculative Execution Through Selective Delay and Value Prediction. In ISCA \u201919.","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Sergey Gorbunov and Christopher\u00a0W. Fletcher. 2018. ZeroTrace : Oblivious Memory Primitives from Intel SGX. In NDSS\u201918.  Sajin Sasy Sergey Gorbunov and Christopher\u00a0W. Fletcher. 2018. ZeroTrace : Oblivious Memory Primitives from Intel SGX. In NDSS\u201918.","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Moritz Lipp Claudio Canella Robert Schilling Florian Kargl and Daniel Gruss. 2020. ConTExT: A Generic Approach for Mitigating Spectre. In NDSS \u201920.  Michael Schwarz Moritz Lipp Claudio Canella Robert Schilling Florian Kargl and Daniel Gruss. 2020. ConTExT: A Generic Approach for Mitigating Spectre. In NDSS \u201920.","DOI":"10.14722\/ndss.2020.24271"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Martin Schwarzl Moritz Lipp and Daniel Gruss. 2019. NetSpectre: Read Arbitrary Memory over Network. In ESORICS \u201919.  Michael Schwarz Martin Schwarzl Moritz Lipp and Daniel Gruss. 2019. NetSpectre: Read Arbitrary Memory over Network. In ESORICS \u201919.","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Fahad Shaon Murat Kantarcioglu Zhiqiang Lin and Latifur Khan. 2017. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. In CCS \u201917.  Fahad Shaon Murat Kantarcioglu Zhiqiang Lin and Latifur Khan. 2017. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. In CCS \u201917.","DOI":"10.1145\/3133956.3134095"},{"key":"e_1_3_2_1_64_1","volume-title":"Modern Processor Design: Fundamentals of Superscalar Processors","author":"Shen John\u00a0Paul","unstructured":"John\u00a0Paul Shen and Mikko\u00a0 H. Lipasti . 2005. Modern Processor Design: Fundamentals of Superscalar Processors ( 1 st ed.). Waveland Press, Inc. John\u00a0Paul Shen and Mikko\u00a0H. Lipasti. 2005. Modern Processor Design: Fundamentals of Superscalar Processors (1st ed.). Waveland Press, Inc.","edition":"1"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Timothy Sherwood Erez Perelman Greg Hamerly and Brad Calder. 2002. Automatically Characterizing Large Scale Program Behavior. In ASPLOS \u201902.  Timothy Sherwood Erez Perelman Greg Hamerly and Brad Calder. 2002. Automatically Characterizing Large Scale Program Behavior. In ASPLOS \u201902.","DOI":"10.1145\/605397.605403"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Youngjoo Shin Hyung\u00a0Chan Kim Dokeun Kwon Ji\u00a0Hoon Jeong and Junbeom Hur. 2018. Unveiling Hardware-Based Data Prefetcher a Hidden Source of Information Leakage. In CCS \u201918.  Youngjoo Shin Hyung\u00a0Chan Kim Dokeun Kwon Ji\u00a0Hoon Jeong and Junbeom Hur. 2018. Unveiling Hardware-Based Data Prefetcher a Hidden Source of Information Leakage. In CCS \u201918.","DOI":"10.1145\/3243734.3243736"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"D. Skarlatos M. Yan B. Gopireddy R. Sprabery J. Torrellas and C.\u00a0W. Fletcher. 2019. MicroScope: Enabling Microarchitectural Replay Attacks. In ISCA \u201919.  D. Skarlatos M. Yan B. Gopireddy R. Sprabery J. Torrellas and C.\u00a0W. Fletcher. 2019. MicroScope: Enabling Microarchitectural Replay Attacks. In ISCA \u201919.","DOI":"10.1145\/3307650.3322228"},{"key":"e_1_3_2_1_68_1","unstructured":"G.\u00a0Edward Suh Jae\u00a0W. Lee David Zhang and Srinivas Devadas. 2004. Secure Program Execution via Dynamic Information Flow Tracking. In ASPLOS \u201904.  G.\u00a0Edward Suh Jae\u00a0W. Lee David Zhang and Srinivas Devadas. 2004. Secure Program Execution via Dynamic Information Flow Tracking. In ASPLOS \u201904."},{"key":"e_1_3_2_1_69_1","unstructured":"Mohammadkazem Taram Ashish Venkat and Dean Tullsen. 2019. Context-Sensitive Fencing : Securing Speculative Execution via Microcode Customization. In ASPLOS \u201919.  Mohammadkazem Taram Ashish Venkat and Dean Tullsen. 2019. Context-Sensitive Fencing : Securing Speculative Execution via Microcode Customization. In ASPLOS \u201919."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Mohit Tiwari Hassan\u00a0M.G. Wassel Bita Mazloom Shashidhar Mysore Frederic\u00a0T. Chong and Timothy Sherwood. 2009. Complete Information Flow Tracking from the Gates Up. In ASPLOS \u201909.  Mohit Tiwari Hassan\u00a0M.G. Wassel Bita Mazloom Shashidhar Mysore Frederic\u00a0T. Chong and Timothy Sherwood. 2009. Complete Information Flow Tracking from the Gates Up. In ASPLOS \u201909.","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Shruti Tople and Prateek Saxena. 2017. On the Trade-Offs in Oblivious Execution Techniques. In DIMVA \u201917.  Shruti Tople and Prateek Saxena. 2017. On the Trade-Offs in Oblivious Execution Techniques. In DIMVA \u201917.","DOI":"10.1007\/978-3-319-60876-1_2"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434330"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Wenhao Wang Guoxing Chen Xiaorui Pan Yinqian Zhang XiaoFeng Wang Vincent Bindschaedler Haixu Tang and Carl\u00a0A. Gunter. 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In CCS \u201917.  Wenhao Wang Guoxing Chen Xiaorui Pan Yinqian Zhang XiaoFeng Wang Vincent Bindschaedler Haixu Tang and Carl\u00a0A. Gunter. 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In CCS \u201917.","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_2_1_75_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems","author":"Xu Yuanzhong","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems . In IEEE S &P \u201915. Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE S&P \u201915."},{"key":"e_1_3_2_1_76_1","unstructured":"Mengjia Yan Jiho Choi Dimitrios Skarlatos Adam Morrison Christopher\u00a0W. Fletcher and Josep Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In MICRO \u201918.  Mengjia Yan Jiho Choi Dimitrios Skarlatos Adam Morrison Christopher\u00a0W. Fletcher and Josep Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In MICRO \u201918."},{"key":"e_1_3_2_1_77_1","volume-title":"Attack Directories","author":"Yan Mengjia","unstructured":"Mengjia Yan , Read Sprabery , Bhargava Gopireddy , Christopher Fletcher , Roy Campbell , and Josep Torrellas . 2019. Attack Directories , Not Caches : Side Channel Attacks in a Non-Inclusive World. In IEEE S &P \u201919. Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher Fletcher, Roy Campbell, and Josep Torrellas. 2019. Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World. In IEEE S&P \u201919."},{"key":"e_1_3_2_1_78_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A high resolution low noise L3 cache side-channel attack. In USENIX Security \u201914.  Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A high resolution low noise L3 cache side-channel attack. In USENIX Security \u201914."},{"key":"e_1_3_2_1_79_1","volume-title":"CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Journal of Cryptographic Engineering 7","author":"Yarom Yuval","year":"2017","unstructured":"Yuval Yarom , Daniel Genkin , and Nadia Heninger . 2017. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Journal of Cryptographic Engineering 7 ( 2017 ). Issue 2. Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2017. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Journal of Cryptographic Engineering 7 (2017). Issue 2."},{"key":"e_1_3_2_1_80_1","unstructured":"Jiyong Yu Lucas Hsiung Mohamad\u00a0El Hajj and Christopher\u00a0W. Fletcher. 2018. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In IACR \u201918.  Jiyong Yu Lucas Hsiung Mohamad\u00a0El Hajj and Christopher\u00a0W. Fletcher. 2018. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In IACR \u201918."},{"key":"e_1_3_2_1_81_1","unstructured":"Jiyong Yu Lucas Hsiung Mohamad\u00a0El Hajj and Christopher\u00a0W. Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In NDSS \u201919. https:\/\/eprint.iacr.org\/2018\/808.  Jiyong Yu Lucas Hsiung Mohamad\u00a0El Hajj and Christopher\u00a0W. Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In NDSS \u201919. https:\/\/eprint.iacr.org\/2018\/808."},{"key":"e_1_3_2_1_82_1","unstructured":"Jiyong Yu Namrata Mantri Josep Torrellas Adam Morrison and Christopher\u00a0W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In ISCA \u201920.  Jiyong Yu Namrata Mantri Josep Torrellas Adam Morrison and Christopher\u00a0W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In ISCA \u201920."},{"key":"e_1_3_2_1_83_1","unstructured":"Jiyong Yu Mengjia Yan Artem Khyzha Adam Morrison Josep Torrellas and Christopher\u00a0W. Fletcher. 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. In MICRO\u201919.  Jiyong Yu Mengjia Yan Artem Khyzha Adam Morrison Josep Torrellas and Christopher\u00a0W. Fletcher. 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. In MICRO\u201919."},{"key":"e_1_3_2_1_85_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI \u201917.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro\u00a0 G. Beekman , Raluca\u00a0Ada Popa , Joseph\u00a0 E. Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI \u201917. Wenting Zheng, Ankur Dave, Jethro\u00a0G. Beekman, Raluca\u00a0Ada Popa, Joseph\u00a0E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI \u201917."}],"event":{"name":"MICRO '21: 54th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Virtual Event Greece","acronym":"MICRO '21","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3466752.3480068","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480068","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:53Z","timestamp":1750195493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":84,"alternative-id":["10.1145\/3466752.3480068","10.1145\/3466752"],"URL":"https:\/\/doi.org\/10.1145\/3466752.3480068","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}