{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:39Z","timestamp":1772725599600,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/V038699\/1"],"award-info":[{"award-number":["EP\/V038699\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1145\/3466752.3480074","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T19:16:55Z","timestamp":1634498215000},"page":"592-606","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["GhostMinion: A Strictness-Ordered Cache System for Spectre Mitigation"],"prefix":"10.1145","author":[{"given":"Sam","family":"Ainsworth","sequence":"first","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Sam Ainsworth and Timothy\u00a0M. Jones. 2020. MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State. In ISCA.  Sam Ainsworth and Timothy\u00a0M. Jones. 2020. MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State. In ISCA.","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"e_1_3_2_1_2_1","unstructured":"Arm. 2018. Arm Processor Security Update. https:\/\/developer.arm.com\/support\/security-update\/compiler-support-for-mitigations.  Arm. 2018. Arm Processor Security Update. https:\/\/developer.arm.com\/support\/security-update\/compiler-support-for-mitigations."},{"key":"e_1_3_2_1_3_1","unstructured":"Arm. 2019. Arm v8.5-A CPU updates. https:\/\/developer.arm.com\/support\/arm-security-updates\/speculative-processor-vulnerability\/downloads\/arm-v8-5-a-cpu-updates.  Arm. 2019. Arm v8.5-A CPU updates. https:\/\/developer.arm.com\/support\/arm-security-updates\/speculative-processor-vulnerability\/downloads\/arm-v8-5-a-cpu-updates."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"K. Barber A. Bacha L. Zhou Y. Zhang and R. Teodorescu. 2019. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. In PACT.  K. Barber A. Bacha L. Zhou Y. Zhang and R. Teodorescu. 2019. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. In PACT.","DOI":"10.1109\/PACT.2019.00020"},{"key":"e_1_3_2_1_5_1","volume-title":"Speculative Interference Attacks: Breaking Invisible Speculation Schemes. In arXiv","author":"Behnia Mohammad","year":"2007","unstructured":"Mohammad Behnia , Prateek Sahu , Riccardo Paccagnella , Jiyong Yu , Zirui Zhao , Xiang Zou , Thomas Unterluggauer , Josep Torrellas , Carlos Rozas , Adam Morrison , Frank Mckeen , Fangfei Liu , Ron Gabor , Christopher\u00a0 W. Fletcher , Abhishek Basak , and Alaa Alameldeen . 2020. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. In arXiv 2007 .11818. Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos Rozas, Adam Morrison, Frank Mckeen, Fangfei Liu, Ron Gabor, Christopher\u00a0W. Fletcher, Abhishek Basak, and Alaa Alameldeen. 2020. Speculative Interference Attacks: Breaking Invisible Speculation Schemes. In arXiv 2007.11818."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Atri Bhattacharyya Alexandra Sandulescu Matthias Neugschwandtner Alessandro Sorniotti Babak Falsafi Mathias Payer and Anil Kurmus. 2019. SMoTherSpectre: Exploiting Speculative Execution through Port Contention. In CCS.  Atri Bhattacharyya Alexandra Sandulescu Matthias Neugschwandtner Alessandro Sorniotti Babak Falsafi Mathias Payer and Anil Kurmus. 2019. SMoTherSpectre: Exploiting Speculative Execution through Port Contention. In CCS.","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_9_1","volume-title":"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security.","author":"Bulck Jo\u00a0Van","year":"2018","unstructured":"Jo\u00a0Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas\u00a0 F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security. Jo\u00a0Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security."},{"key":"e_1_3_2_1_10_1","volume-title":"SpectreRewind: Leaking Secrets to Past Instructions. In arXiv","author":"Fustos Jacob","year":"2003","unstructured":"Jacob Fustos , Michael Bechtel , and Heechul Yun . 2020. SpectreRewind: Leaking Secrets to Past Instructions. In arXiv 2003 .12208. arxiv:2003.12208\u00a0[cs.CR] Jacob Fustos, Michael Bechtel, and Heechul Yun. 2020. SpectreRewind: Leaking Secrets to Past Instructions. In arXiv 2003.12208. arxiv:2003.12208\u00a0[cs.CR]"},{"key":"e_1_3_2_1_11_1","volume-title":"Younis, and Krste Asanovi\u0107","author":"Gonzalez Abraham","year":"2019","unstructured":"Abraham Gonzalez , Ben Korpan , Jerry Zhao , Ed Younis, and Krste Asanovi\u0107 . 2019 . Replicating and Mitigating Spectre Attacks on an Open Source RISC-V Microarchitecture. In CARRV. Abraham Gonzalez, Ben Korpan, Jerry Zhao, Ed Younis, and Krste Asanovi\u0107. 2019. Replicating and Mitigating Spectre Attacks on an Open Source RISC-V Microarchitecture. In CARRV."},{"key":"e_1_3_2_1_12_1","volume-title":"Spectector: Principled Detection of Speculative Information Flows. In SP.","author":"Guarnieri M.","year":"2020","unstructured":"M. Guarnieri , B. Kopf , J.\u00a0 F. Morales , J. Reineke , and A. Sanchez . 2020 . Spectector: Principled Detection of Speculative Information Flows. In SP. M. Guarnieri, B. Kopf, J.\u00a0F. Morales, J. Reineke, and A. Sanchez. 2020. Spectector: Principled Detection of Speculative Information Flows. In SP."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Zecheng He Guangyuan Hu and Ruby Lee. 2021. New Models for Understanding and Reasoning about Speculative Execution Attacks. In HPCA.  Zecheng He Guangyuan Hu and Ruby Lee. 2021. New Models for Understanding and Reasoning about Speculative Execution Attacks. In HPCA.","DOI":"10.1109\/HPCA51647.2021.00014"},{"key":"e_1_3_2_1_14_1","volume-title":"SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News 34","author":"Henning L.","year":"2006","unstructured":"John\u00a0 L. Henning . 2006 . SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News 34 , 4 (Sept. 2006). John\u00a0L. Henning. 2006. SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News 34, 4 (Sept. 2006)."},{"key":"e_1_3_2_1_15_1","unstructured":"Intel. 2018. Intel Analysis of Speculative Execution Side Channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf.  Intel. 2018. Intel Analysis of Speculative Execution Side Channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Khaled\u00a0N. Khasawneh Esmaeil\u00a0Mohammadian Koruyeh Chengyu Song Dmitry Evtyushkin Dmitry Ponomarev and Nael Abu-Ghazaleh. 2019. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. In DAC.  Khaled\u00a0N. Khasawneh Esmaeil\u00a0Mohammadian Koruyeh Chengyu Song Dmitry Evtyushkin Dmitry Ponomarev and Nael Abu-Ghazaleh. 2019. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. In DAC.","DOI":"10.1145\/3316781.3317903"},{"key":"e_1_3_2_1_17_1","volume-title":"DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO.","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky , Ilia Lebedev , Saman Amarasinghe , Srinivas Devadas , and Joel Emer . 2018 . DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO. Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, and Joel Emer. 2018. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In MICRO."},{"key":"e_1_3_2_1_18_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In S&P.","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution. In S&P. Paul Kocher, Jann Horn, Anders Fogh, , Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In S&P."},{"key":"e_1_3_2_1_19_1","volume-title":"Article 21 (Aug.","author":"Lee Jaekyu","year":"2020","unstructured":"Jaekyu Lee , Yasuo Ishii , and Dam Sunwoo . 2020. Securing Branch Predictors with Two-Level Encryption. ACM TACO 17, 3 , Article 21 (Aug. 2020 ), 25\u00a0pages. Jaekyu Lee, Yasuo Ishii, and Dam Sunwoo. 2020. Securing Branch Predictors with Two-Level Encryption. ACM TACO 17, 3, Article 21 (Aug. 2020), 25\u00a0pages."},{"key":"e_1_3_2_1_20_1","volume-title":"Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA.","author":"Li P.","year":"2019","unstructured":"P. Li , L. Zhao , R. Hou , L. Zhang , and D. Meng . 2019 . Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA. P. Li, L. Zhao, R. Hou, L. Zhang, and D. Meng. 2019. Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. In HPCA."},{"key":"e_1_3_2_1_21_1","volume-title":"Meltdown: Reading kernel memory from user space. In USENIX Security.","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading kernel memory from user space. In USENIX Security. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading kernel memory from user space. In USENIX Security."},{"key":"e_1_3_2_1_22_1","volume-title":"DOLMA: Securing Speculation with the Principle of Transient Non-Observability.","author":"Loughlin Kevin","year":"2020","unstructured":"Kevin Loughlin , Ian Neal , Jiacheng Ma , Elisa Tsai , Ofir Weisse , Satish Narayanasamy , and Baris Kasikci . 2020 . DOLMA: Securing Speculation with the Principle of Transient Non-Observability. (2020). Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2020. DOLMA: Securing Speculation with the Principle of Transient Non-Observability. (2020)."},{"key":"e_1_3_2_1_23_1","unstructured":"Naveen Muralimanohar Rajeev Balasubramonian and Norman\u00a0P Jouppi. 2007. CACTI 6.0: A tool to model large caches. In MICRO.  Naveen Muralimanohar Rajeev Balasubramonian and Norman\u00a0P Jouppi. 2007. CACTI 6.0: A tool to model large caches. In MICRO."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/647324.721526"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"G. Papadimitriou A. Chatzidimitriou and D. Gizopoulos. 2019. Adaptive Voltage\/Frequency Scaling and Core Allocation for Balanced Energy and Performance on Multicore CPUs. In HPCA.  G. Papadimitriou A. Chatzidimitriou and D. Gizopoulos. 2019. Adaptive Voltage\/Frequency Scaling and Core Allocation for Balanced Energy and Performance on Multicore CPUs. In HPCA.","DOI":"10.1109\/HPCA.2019.00033"},{"key":"e_1_3_2_1_26_1","unstructured":"Glenn Reinman Brad Calder and Todd Austin. 1999. Fetch Directed Instruction Prefetching. In MICRO.  Glenn Reinman Brad Calder and Todd Austin. 1999. Fetch Directed Instruction Prefetching. In MICRO."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Gururaj Saileshwar and Moinuddin\u00a0K. Qureshi. 2019. CleanupSpec: An \u201cUndo\u201d Approach to Safe Speculation. In MICRO.  Gururaj Saileshwar and Moinuddin\u00a0K. Qureshi. 2019. CleanupSpec: An \u201cUndo\u201d Approach to Safe Speculation. In MICRO.","DOI":"10.1145\/3352460.3358314"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3321558"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Christos Sakalis Stefanos Kaxiras Alberto Ros Alexandra Jimborean and Magnus Sj\u00e4lander. 2019. Efficient Invisible Speculative Execution through Selective Delay and Value Prediction. In ISCA.  Christos Sakalis Stefanos Kaxiras Alberto Ros Alexandra Jimborean and Magnus Sj\u00e4lander. 2019. Efficient Invisible Speculative Execution through Selective Delay and Value Prediction. In ISCA.","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Martin Schwarzl Moritz Lipp Jon Masters and Daniel Gruss. 2019. NetSpectre: Read Arbitrary Memory over Network. In ESORICS.  Michael Schwarz Martin Schwarzl Moritz Lipp Jon Masters and Daniel Gruss. 2019. NetSpectre: Read Arbitrary Memory over Network. In ESORICS.","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_2_1_31_1","volume-title":"KAISER: Hiding the kernel from user space. https:\/\/lwn.net\/Articles\/738975\/.","author":"Tang Jack","year":"2017","unstructured":"Jack Tang . 2017 . KAISER: Hiding the kernel from user space. https:\/\/lwn.net\/Articles\/738975\/. Jack Tang. 2017. KAISER: Hiding the kernel from user space. https:\/\/lwn.net\/Articles\/738975\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Mohammadkazem Taram Ashish Venkat and Dean Tullsen. 2019. Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization. In ASPLOS.  Mohammadkazem Taram Ashish Venkat and Dean Tullsen. 2019. Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization. In ASPLOS."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Caroline Trippel Daniel Lustig and Margaret Martonosi. 2018. CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. In MICRO.  Caroline Trippel Daniel Lustig and Margaret Martonosi. 2018. CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. In MICRO.","DOI":"10.1109\/MICRO.2018.00081"},{"key":"e_1_3_2_1_34_1","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886.  Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_2_1_36_1","volume-title":"ReversiSpec: Reversible Coherence Protocol for Defending Transient Attacks. In arXiv","author":"Wu You","year":"2006","unstructured":"You Wu and Xuehai Qian . 2020. ReversiSpec: Reversible Coherence Protocol for Defending Transient Attacks. In arXiv 2006 .16535. You Wu and Xuehai Qian. 2020. ReversiSpec: Reversible Coherence Protocol for Defending Transient Attacks. In arXiv 2006.16535."},{"key":"e_1_3_2_1_37_1","unstructured":"Mengjia Yan Jiho Choi Dimitrios Skarlatos Adam Morrison Christopher\u00a0W Fletcher and Josep Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In MICRO.  Mengjia Yan Jiho Choi Dimitrios Skarlatos Adam Morrison Christopher\u00a0W Fletcher and Josep Torrellas. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In MICRO."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"J. Yu N. Mantri J. Torrellas A. Morrison and C.\u00a0W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In ISCA.  J. Yu N. Mantri J. Torrellas A. Morrison and C.\u00a0W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In ISCA.","DOI":"10.1109\/ISCA45697.2020.00064"},{"key":"e_1_3_2_1_39_1","unstructured":"Jiyong Yu Mengjia Yan Artem Khyzha Adam Morrison Josep Torrellas and Christopher\u00a0W. Fletcher. 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. In MICRO.  Jiyong Yu Mengjia Yan Artem Khyzha Adam Morrison Josep Torrellas and Christopher\u00a0W. Fletcher. 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. In MICRO."}],"event":{"name":"MICRO '21: 54th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Virtual Event Greece","acronym":"MICRO '21","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480074","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:56Z","timestamp":1750191536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":38,"alternative-id":["10.1145\/3466752.3480074","10.1145\/3466752"],"URL":"https:\/\/doi.org\/10.1145\/3466752.3480074","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}