{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:29:52Z","timestamp":1763724592296,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["Intel Side Channel Academic Program"],"award-info":[{"award-number":["Intel Side Channel Academic Program"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research","award":["13N1S0762"],"award-info":[{"award-number":["13N1S0762"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2017863"],"award-info":[{"award-number":["2017863"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,18]]},"DOI":"10.1145\/3470496.3527412","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T19:06:01Z","timestamp":1654023961000},"page":"72-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Axiomatic hardware-software contracts for security"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Mosier","sequence":"first","affiliation":[{"name":"Stanford University"}]},{"given":"Hanna","family":"Lachnitt","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Hamed","family":"Nemati","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Caroline","family":"Trippel","sequence":"additional","affiliation":[{"name":"Stanford University"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994593"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jade Alglave Luc Maranget Susmit Sarkar and Peter Sewell. 2011. Litmus: Running Tests Against Hardware. 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS): Part of the Joint European Conferences on Theory and Practice of Software (ETAPS) (2011).  Jade Alglave Luc Maranget Susmit Sarkar and Peter Sewell. 2011. Litmus: Running Tests Against Hardware. 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS): Part of the Joint European Conferences on Theory and Practice of Software (ETAPS) (2011).","DOI":"10.1007\/978-3-642-19835-9_5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627752"},{"volume-title":"On Subnormal Floating Point and Abnormal Timing. In 2015 IEEE Symposium on Security and Privacy.","author":"Andrysco M.","key":"e_1_3_2_1_5_1","unstructured":"M. Andrysco , D. Kohlbrenner , K. Mowery , R. Jhala , S. Lerner , and H. Shacham . 2015 . On Subnormal Floating Point and Abnormal Timing. In 2015 IEEE Symposium on Security and Privacy. M. Andrysco, D. Kohlbrenner, K. Mowery, R. Jhala, S. Lerner, and H. Shacham. 2015. On Subnormal Floating Point and Abnormal Timing. In 2015 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. 2013. ARM A64 instruction set architecture. https:\/\/developer.arm.com\/documentation  ARM. 2013. ARM A64 instruction set architecture. https:\/\/developer.arm.com\/documentation"},{"key":"e_1_3_2_1_7_1","unstructured":"ARM Mbed. x. Mbed TLS. https:\/\/github.com\/armmbed\/mbedtls  ARM Mbed. x. Mbed TLS. https:\/\/github.com\/armmbed\/mbedtls"},{"key":"e_1_3_2_1_8_1","volume-title":"High-Assurance Cryptography in the Spectre Era. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Barthe Gilles","year":"2021","unstructured":"Gilles Barthe , Sunjay Cauligi , Benjamin Gr\u00e9goire , Adrien Koutsos , Kevin Liao , Tiago Oliveira , Swarn Priya , Tamara Rezk , and Peter Schwabe . 2021 . High-Assurance Cryptography in the Spectre Era. In 42nd IEEE Symposium on Security and Privacy, SP 2021 , San Francisco, CA, USA, 24- -27 May 2021. Gilles Barthe, Sunjay Cauligi, Benjamin Gr\u00e9goire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, and Peter Schwabe. 2021. High-Assurance Cryptography in the Spectre Era. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24--27 May 2021."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837637"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926394"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"e_1_3_2_1_12_1","unstructured":"Dan Bernstein. 2008. curve25519-donna. https:\/\/code.google.com\/archive\/p\/curve25519-donna\/.  Dan Bernstein. 2008. curve25519-donna. https:\/\/code.google.com\/archive\/p\/curve25519-donna\/."},{"key":"e_1_3_2_1_13_1","volume-title":"29th Conference on Programming Language Design and Implementation (PLDI)","author":"J.","year":"2008","unstructured":"Hans- J. Boehm and Sarita V. Adve. 2008. Foundations of the C++ Concurrency Memory Model . 29th Conference on Programming Language Design and Implementation (PLDI) ( 2008 ). Hans-J. Boehm and Sarita V. Adve. 2008. Foundations of the C++ Concurrency Memory Model. 29th Conference on Programming Language Design and Implementation (PLDI) (2008)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062353"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385970"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00027"},{"key":"e_1_3_2_1_17_1","volume-title":"Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Daniel Lesly-Ann","year":"2021","unstructured":"Lesly-Ann Daniel , S\u00e9bastien Bardin , and Tamara Rezk . 2021 . Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021 , virtually, February 21 --25 , 2021. Lesly-Ann Daniel, S\u00e9bastien Bardin, and Tamara Rezk. 2021. Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021."},{"key":"e_1_3_2_1_18_1","unstructured":"Lesly-Ann Daniel. 2021. Binsec\/haunted benchmark. https:\/\/github.com\/binsec\/haunted_bench\/.  Lesly-Ann Daniel. 2021. Binsec\/haunted benchmark. https:\/\/github.com\/binsec\/haunted_bench\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Hern\u00e1n Ponce de Le\u00f3n and Johannes Kinder. 2021. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. https:\/\/arxiv.org\/abs\/2108.13818  Hern\u00e1n Ponce de Le\u00f3n and Johannes Kinder. 2021. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. https:\/\/arxiv.org\/abs\/2108.13818","DOI":"10.1109\/SP46214.2022.9833774"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_21_1","unstructured":"Frank Denis. 2019. libsodium. https:\/\/github.com\/jedisct1\/libsodium.  Frank Denis. 2019. libsodium. https:\/\/github.com\/jedisct1\/libsodium."},{"key":"e_1_3_2_1_22_1","volume-title":"The Code That Never Ran: Modeling Attacks on Speculative Evaluation. In 2019 IEEE Symposium on Security and Privacy (SP).","author":"Disselkoen Craig","year":"2019","unstructured":"Craig Disselkoen , Radha Jagadeesan , Alan Jeffrey , and James Riely . 2019 . The Code That Never Ran: Modeling Attacks on Speculative Evaluation. In 2019 IEEE Symposium on Security and Privacy (SP). Craig Disselkoen, Radha Jagadeesan, Alan Jeffrey, and James Riely. 2019. The Code That Never Ran: Modeling Attacks on Speculative Evaluation. In 2019 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_23_1","volume-title":"A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering","author":"Ge Qian","year":"2016","unstructured":"Qian Ge , Yuval Yarom , David Cock , and Gernot Heiser . 2016. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering ( 2016 ). Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2016. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering (2016)."},{"volume-title":"Security Policies and Security Models. In 1982 IEEE Symposium on Security and Privacy.","author":"Goguen J. A.","key":"e_1_3_2_1_24_1","unstructured":"J. A. Goguen and J. Meseguer . 1982 . Security Policies and Security Models. In 1982 IEEE Symposium on Security and Privacy. J. A. Goguen and J. Meseguer. 1982. Security Policies and Security Models. In 1982 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417246"},{"volume-title":"Spectector: Principled Detection of Speculative Information Flows. In 2020 IEEE Symposium on Security and Privacy (SP).","author":"Guarnieri M.","key":"e_1_3_2_1_26_1","unstructured":"M. Guarnieri , B. K\u00f6pf , J. F. Morales , J. Reineke , and A. S\u00e1nchez . 2020 . Spectector: Principled Detection of Speculative Information Flows. In 2020 IEEE Symposium on Security and Privacy (SP). M. Guarnieri, B. K\u00f6pf, J. F. Morales, J. Reineke, and A. S\u00e1nchez. 2020. Spectector: Principled Detection of Speculative Information Flows. In 2020 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_27_1","volume-title":"Hardware-Software Contracts for Secure Speculation. In 2021 IEEE Symposium on Security and Privacy.","author":"Guarnieri Marco","year":"2021","unstructured":"Marco Guarnieri , Boris K\u00f6pf , Jan Reineke , and Pepe Vila . 2021 . Hardware-Software Contracts for Secure Speculation. In 2021 IEEE Symposium on Security and Privacy. Marco Guarnieri, Boris K\u00f6pf, Jan Reineke, and Pepe Vila. 2021. Hardware-Software Contracts for Secure Speculation. In 2021 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380428"},{"key":"e_1_3_2_1_29_1","unstructured":"Jann Horn. 2018. Speculative execution variant 4: Speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528  Jann Horn. 2018. Speculative execution variant 4: Speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480087"},{"key":"e_1_3_2_1_31_1","unstructured":"Intel. 2018. Q2 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00115.html  Intel. 2018. Q2 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00115.html"},{"key":"e_1_3_2_1_32_1","unstructured":"Intel. 2019. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals Order Number: 325462-070US. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1-2abcd-3abcd.pdf  Intel. 2019. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals Order Number: 325462-070US. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1-2abcd-3abcd.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"D. Jackson. 2012. Alloy Analyzer website. http:\/\/alloy.mit.edu\/  D. Jackson. 2012. Alloy Analyzer website. http:\/\/alloy.mit.edu\/"},{"key":"e_1_3_2_1_34_1","volume-title":"DAWG: ADefense Against Cache Timing Attacks in Speculative Execution Processors. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO).","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky , Ilia Lebedev , Saman Amarasinghe , Srinivas Devadas , and Joel Emer . 2018 . DAWG: ADefense Against Cache Timing Attacks in Speculative Execution Processors. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, and Joel Emer. 2018. DAWG: ADefense Against Cache Timing Attacks in Speculative Execution Processors. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)."},{"key":"e_1_3_2_1_35_1","volume-title":"Speculative Buffer Overflows: Attacks and Defenses. CoRR abs\/1807.03757","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger . 2018. Speculative Buffer Overflows: Attacks and Defenses. CoRR abs\/1807.03757 ( 2018 ). arXiv:1807.03757 https:\/\/dblp.org\/rec\/bib\/journals\/corr\/abs-1807-03757 http:\/\/arxiv.org\/abs\/1807.03757. Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. CoRR abs\/1807.03757 (2018). arXiv:1807.03757 https:\/\/dblp.org\/rec\/bib\/journals\/corr\/abs-1807-03757 http:\/\/arxiv.org\/abs\/1807.03757."},{"key":"e_1_3_2_1_36_1","unstructured":"Paul Kocher. 2018. Spectre Mitigations in Microsoft's C\/C++ Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html.  Paul Kocher. 2018. Spectre Mitigations in Microsoft's C\/C++ Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html."},{"key":"e_1_3_2_1_37_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2018 . Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203 (2018). https:\/\/arxiv.org\/abs\/1801.01203 Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203 (2018). https:\/\/arxiv.org\/abs\/1801.01203"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_3_2_1_40_1","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. Tech. Report UIUCDCS-R-2003-2380. Computer Science Dept., Univ. of Illinois at Urbana-Champaign.","author":"Lattner Chris","year":"2003","unstructured":"Chris Lattner and Vikram Adve . 2003 . LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. Tech. Report UIUCDCS-R-2003-2380. Computer Science Dept., Univ. of Illinois at Urbana-Champaign. Chris Lattner and Vikram Adve. 2003. LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. Tech. Report UIUCDCS-R-2003-2380. Computer Science Dept., Univ. of Illinois at Urbana-Champaign."},{"volume-title":"Proceedings of the 33rd Annual ACM\/IEEE International Symposium on Microarchitecture.","author":"Kevin","key":"e_1_3_2_1_41_1","unstructured":"Kevin M. Lepak and Mikko H. Lipasti. 2000. Silent Stores for Free . In Proceedings of the 33rd Annual ACM\/IEEE International Symposium on Microarchitecture. Kevin M. Lepak and Mikko H. Lipasti. 2000. Silent Stores for Free. In Proceedings of the 33rd Annual ACM\/IEEE International Symposium on Microarchitecture."},{"key":"e_1_3_2_1_42_1","volume-title":"CoRR abs\/1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. CoRR abs\/1801.01207 ( 2018 ). https:\/\/arxiv.org\/abs\/1801.01207 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. CoRR abs\/1801.01207 (2018). https:\/\/arxiv.org\/abs\/1801.01207"},{"volume-title":"Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy.","author":"Lowe-Power Jason","key":"e_1_3_2_1_43_1","unstructured":"Jason Lowe-Power , Venkatesh Akella , Matthew K. Farrens , Samuel T. King , and Christopher J. Nitta . 2018. Position Paper: A Case for Exposing Extra-architectural State in the ISA . In Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy. Jason Lowe-Power, Venkatesh Akella, Matthew K. Farrens, Samuel T. King, and Christopher J. Nitta. 2018. Position Paper: A Case for Exposing Extra-architectural State in the ISA. In Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy."},{"key":"e_1_3_2_1_44_1","volume-title":"Automated Synthesis of Comprehensive Memory Model Litmus Test Suites. 22nd International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Lustig Daniel","year":"2017","unstructured":"Daniel Lustig , Andrew Wright , Alexandros Papakonstantinou , and Olivier Giroux . 2017 . Automated Synthesis of Comprehensive Memory Model Litmus Test Suites. 22nd International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2017). Daniel Lustig, Andrew Wright, Alexandros Papakonstantinou, and Olivier Giroux. 2017. Automated Synthesis of Comprehensive Memory Model Litmus Test Suites. 22nd International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2017)."},{"key":"e_1_3_2_1_45_1","volume-title":"The Java Memory Model. 32nd Symposium on Principles of Programming Languages (POPL)","author":"Manson Jeremy","year":"2005","unstructured":"Jeremy Manson , William Pugh , and Sarita Adve . 2005 . The Java Memory Model. 32nd Symposium on Principles of Programming Languages (POPL) (2005). Jeremy Manson, William Pugh, and Sarita Adve. 2005. The Java Memory Model. 32nd Symposium on Principles of Programming Languages (POPL) (2005)."},{"key":"e_1_3_2_1_46_1","volume-title":"Check: Research Tools and Papers","author":"Margaret Martonosi","year":"2017","unstructured":"Margaret Martonosi et al. 2017 . Check: Research Tools and Papers . http:\/\/check.cs.princeton.edu Margaret Martonosi et al. 2017. Check: Research Tools and Papers. http:\/\/check.cs.princeton.edu"},{"key":"e_1_3_2_1_47_1","unstructured":"Ross Mcilroy Jaroslav Sevcik Tobias Tebbi Ben L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. https:\/\/arxiv.org\/abs\/1902.05178  Ross Mcilroy Jaroslav Sevcik Tobias Tebbi Ben L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. https:\/\/arxiv.org\/abs\/1902.05178"},{"key":"e_1_3_2_1_48_1","unstructured":"Matt Miller. 2018. Mitigating speculative execution side channel hardware vulnerabilities. https:\/\/msrc-blog.microsoft.com\/2018\/03\/15\/mitigating-speculative-execution-side-channel-hardware-vulnerabilities\/  Matt Miller. 2018. Mitigating speculative execution side channel hardware vulnerabilities. https:\/\/msrc-blog.microsoft.com\/2018\/03\/15\/mitigating-speculative-execution-side-channel-hardware-vulnerabilities\/"},{"key":"e_1_3_2_1_49_1","volume-title":"Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom.","author":"Minkin Marina","year":"2019","unstructured":"Marina Minkin , Daniel Moghimi , Moritz Lipp , Michael Schwarz , Jo Van Bulck , Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom. 2019 . Fallout : Reading Kernel Writes From User Space . (2019). Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom. 2019. Fallout: Reading Kernel Writes From User Space. (2019)."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 8th International Conference on Information Security and Cryptology.","author":"Molnar David","year":"2005","unstructured":"David Molnar , Matt Piotrowski , David Schultz , and David Wagner . 2005 . The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks . In Proceedings of the 8th International Conference on Information Security and Cryptology. David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In Proceedings of the 8th International Conference on Information Security and Cryptology."},{"key":"e_1_3_2_1_51_1","unstructured":"Nicholas Mosier and Caroline Trippel. 2022. clou-bugs. https:\/\/github.com\/nmosier\/clou-bugs  Nicholas Mosier and Caroline Trippel. 2022. clou-bugs. https:\/\/github.com\/nmosier\/clou-bugs"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00962ED2V01Y201910CAC049"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2983997"},{"key":"e_1_3_2_1_54_1","unstructured":"NVIDIA. 2017. Parallel Thread Execution ISAVersion 6.0. http:\/\/docs.nvidia.com\/cuda\/parallel-thread-execution\/index.html  NVIDIA. 2017. Parallel Thread Execution ISAVersion 6.0. http:\/\/docs.nvidia.com\/cuda\/parallel-thread-execution\/index.html"},{"key":"e_1_3_2_1_55_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oleksenko Oleksii","year":"2020","unstructured":"Oleksii Oleksenko , Bohdan Trach , Mark Silberstein , and Christof Fetzer . 2020 . SpecFuzz: Bringing Spectre-type vulnerabilities to the surface . In 29th USENIX Security Symposium (USENIX Security 20) . Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, and Christof Fetzer. 2020. SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_56_1","unstructured":"OpenSSL 2021. OpenSSL: Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/.  OpenSSL 2021. OpenSSL: Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_57_1","unstructured":"OpenSSL 2022. OpenSSL's implementation of SSL_get_shared_sigalgs. https:\/\/github.com\/openssl\/openssl\/blob\/d5530efada83825ef239a8458db541adc4b422ec\/ssl\/t1_lib.c#L2408  OpenSSL 2022. OpenSSL's implementation of SSL_get_shared_sigalgs. https:\/\/github.com\/openssl\/openssl\/blob\/d5530efada83825ef239a8458db541adc4b422ec\/ssl\/t1_lib.c#L2408"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03359-9_27"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Marco Patrignani and Marco Guarnieri. 2021. Exorcising Spectres with Secure Compilers. arXiv:1910.08607 [cs.PL]  Marco Patrignani and Marco Guarnieri. 2021. Exorcising Spectres with Secure Compilers. arXiv:1910.08607 [cs.PL]","DOI":"10.1145\/3460120.3484534"},{"key":"e_1_3_2_1_60_1","volume-title":"29th European Conference on Object-Oriented Programming (ECOOP)","author":"Petri Gustavo","year":"2015","unstructured":"Gustavo Petri , Jan Vitek , and Suresh Jagannathan . 2015 . Cooking the books: Formalizing JMM implementation recipes . 29th European Conference on Object-Oriented Programming (ECOOP) (2015). Gustavo Petri, Jan Vitek, and Suresh Jagannathan. 2015. Cooking the books: Formalizing JMM implementation recipes. 29th European Conference on Object-Oriented Programming (ECOOP) (2015)."},{"key":"e_1_3_2_1_61_1","unstructured":"Thomas Pornin. 2016. Why Constant-Time. https:\/\/www.bearssl.org\/constanttime.html  Thomas Pornin. 2016. Why Constant-Time. https:\/\/www.bearssl.org\/constanttime.html"},{"key":"e_1_3_2_1_62_1","unstructured":"Thomas Pornin. 2018. Constant-Time Toolkit. https:\/\/github.com\/pornin\/CTTK.  Thomas Pornin. 2018. Constant-Time Toolkit. https:\/\/github.com\/pornin\/CTTK."},{"key":"e_1_3_2_1_63_1","volume-title":"Simplifying ARM Concurrency: Multicopy-atomic Axiomatic and Operational Models for ARMv8. ACM Programming Languages","author":"Pulte Christopher","year":"2017","unstructured":"Christopher Pulte , Shaked Flur , Will Deacon , Jon French , Susmit Sarkar , and Peter Sewell . 2017. Simplifying ARM Concurrency: Multicopy-atomic Axiomatic and Operational Models for ARMv8. ACM Programming Languages ( 2017 ). Christopher Pulte, Shaked Flur, Will Deacon, Jon French, Susmit Sarkar, and Peter Sewell. 2017. Simplifying ARM Concurrency: Multicopy-atomic Axiomatic and Operational Models for ARMv8. ACM Programming Languages (2017)."},{"key":"e_1_3_2_1_64_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss.","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz , Moritz Lipp , Daniel Moghimi , Jo Van Bulck , Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019 . ZombieLoad: Cross-Privilege- Boundary Data Sampling. CoRR abs\/1905.05726 (2019). arXiv:1905.05726 https:\/\/arxiv.org\/abs\/1905.05726 Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. CoRR abs\/1905.05726 (2019). arXiv:1905.05726 https:\/\/arxiv.org\/abs\/1905.05726"},{"key":"e_1_3_2_1_65_1","unstructured":"The OpenSSL Project. 2021. SSL_get_shared_sigalgs. https:\/\/www.openssl.org\/docs\/man3.0\/man3\/SSL_get_shared_sigalgs.html  The OpenSSL Project. 2021. SSL_get_shared_sigalgs. https:\/\/www.openssl.org\/docs\/man3.0\/man3\/SSL_get_shared_sigalgs.html"},{"key":"e_1_3_2_1_66_1","volume-title":"CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. 51st International Symposium on Microarchitecture (MICRO)","author":"Trippel Caroline","year":"2018","unstructured":"Caroline Trippel , Daniel Lustig , and Margaret Martonosi . 2018 . CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. 51st International Symposium on Microarchitecture (MICRO) (2018). Caroline Trippel, Daniel Lustig, and Margaret Martonosi. 2018. CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. 51st International Symposium on Microarchitecture (MICRO) (2018)."},{"key":"e_1_3_2_1_67_1","volume-title":"RIDL: Rogue In-flight Data Load. S&P (May","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2019 . RIDL: Rogue In-flight Data Load. S&P (May 2019). Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-flight Data Load. S&P (May 2019)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434330"},{"key":"e_1_3_2_1_69_1","volume-title":"Fletcher","author":"Vicarte Jose","year":"2021","unstructured":"Jose Vicarte , Pradyumna Shome , Nandeeka Nayak , Caroline Trippel , Adam Morrison , David Kohlbrenner , and Christopher W . Fletcher . 2021 . Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data. In ISCA '21. Jose Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, and Christopher W. Fletcher. 2021. Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data. In ISCA'21."},{"key":"e_1_3_2_1_70_1","volume-title":"Tulika Mitra, and Abhik Roychoudhury.","author":"Wang Guanhua","year":"2020","unstructured":"Guanhua Wang , Sudipta Chattopadhyay , Arnab Kumar Biswas , Tulika Mitra, and Abhik Roychoudhury. 2020 . KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution . (2020). Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, and Abhik Roychoudhury. 2020. KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution. (2020)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Guanhua Wang Sudipta Chattopadhyay Ivan Gotovchits Tulika Mitra and Abhik Roychoudhury. 2021. oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis. (2021).  Guanhua Wang Sudipta Chattopadhyay Ivan Gotovchits Tulika Mitra and Abhik Roychoudhury. 2021. oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis. (2021).","DOI":"10.1109\/TSE.2019.2953709"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"David Wheeler and Roger Needham. 1994. The Tiny Encryption Algorithm. https:\/\/www.schneier.com\/sccd\/TEA.C.  David Wheeler and Roger Needham. 1994. The Tiny Encryption Algorithm. https:\/\/www.schneier.com\/sccd\/TEA.C.","DOI":"10.1007\/3-540-60590-8_29"},{"key":"e_1_3_2_1_74_1","volume-title":"30th International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)","author":"Wickerson John","year":"2015","unstructured":"John Wickerson , Mark Batty , Bradford M. Beckmann , and Alastair F. Donaldson . 2015. Remote-Scope Promotion: Clarified, Rectified, and Verified . 30th International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA) ( 2015 ). John Wickerson, Mark Batty, Bradford M. Beckmann, and Alastair F. Donaldson. 2015. Remote-Scope Promotion: Clarified, Rectified, and Verified. 30th International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA) (2015)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009838"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314647"},{"volume-title":"Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In 26th Annual Network and Distributed System Security Symposium, NDSS.","author":"Yu Jiyong","key":"e_1_3_2_1_78_1","unstructured":"Jiyong Yu , Lucas Hsiung , Mohamad El Hajj , and Christopher W. Fletcher . 2019 . Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In 26th Annual Network and Distributed System Security Symposium, NDSS. Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, and Christopher W. Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In 26th Annual Network and Distributed System Security Symposium, NDSS."},{"volume-title":"Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture.","author":"Yu Jiyong","key":"e_1_3_2_1_79_1","unstructured":"Jiyong Yu , Mengjia Yan , Artem Khyzha , Adam Morrison , Josep Torrellas , and Christopher W. Fletcher . 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data . In Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture. Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, and Christopher W. Fletcher. 2019. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. In Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830807"},{"key":"e_1_3_2_1_81_1","first-page":"348","article-title":"Hardware prefetcher for indirect access patterns","volume":"14","author":"Yu X.","year":"2016","unstructured":"X. Yu , C. J. Hughes , and N. R. Satish . 2016 . Hardware prefetcher for indirect access patterns . US Patent 14\/582 , 348 . Filed December 24, 2014. Issued June 30, 2016.. X. Yu, C. J. Hughes, and N. R. Satish. 2016. Hardware prefetcher for indirect access patterns. US Patent 14\/582,348. Filed December 24, 2014. Issued June 30, 2016..","journal-title":"US Patent"},{"volume-title":"32nd IEEE Computer Security Foundations Symposium, CSF.","author":"Zagieboylo Drew","key":"e_1_3_2_1_82_1","unstructured":"Drew Zagieboylo , G. Edward Suh , and Andrew C. Myers . 2019. Using Information Flow to Design an ISA that Controls Timing Channels . In 32nd IEEE Computer Security Foundations Symposium, CSF. Drew Zagieboylo, G. Edward Suh, and Andrew C. Myers. 2019. Using Information Flow to Design an ISA that Controls Timing Channels. In 32nd IEEE Computer Security Foundations Symposium, CSF."},{"volume-title":"Proceedings of the 30th Annual Computer Security Applications Conference.","author":"Zhang Tianwei","key":"e_1_3_2_1_83_1","unstructured":"Tianwei Zhang and Ruby B. Lee . 2014. New Models of Cache Architectures Characterizing Information Leakage from Cache Side Channels . In Proceedings of the 30th Annual Computer Security Applications Conference. Tianwei Zhang and Ruby B. Lee. 2014. New Models of Cache Architectures Characterizing Information Leakage from Cache Side Channels. In Proceedings of the 30th Annual Computer Security Applications Conference."}],"event":{"name":"ISCA '22: The 49th Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"],"location":"New York New York","acronym":"ISCA '22"},"container-title":["Proceedings of the 49th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527412","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:28Z","timestamp":1750188628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":82,"alternative-id":["10.1145\/3470496.3527412","10.1145\/3470496"],"URL":"https:\/\/doi.org\/10.1145\/3470496.3527412","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}