{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:41Z","timestamp":1750220141760,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Polish National Centre for Research and Development","award":["CYBERSECIDENT\/369532\/I\/NCBR\/2017"],"award-info":[{"award-number":["CYBERSECIDENT\/369532\/I\/NCBR\/2017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,11]]},"DOI":"10.1145\/3514105.3514112","type":"proceedings-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:23:47Z","timestamp":1648808627000},"page":"35-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Evaluation of Meltdown Vulnerability"],"prefix":"10.1145","author":[{"given":"Mateusz","family":"Nosek","sequence":"first","affiliation":[{"name":"Institute of Telecommunications, Warsaw University of Technology, Poland"}]},{"given":"Krzysztof","family":"Szczypiorski","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Warsaw University of Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3357033"},{"key":"e_1_3_2_1_2_1","volume-title":"Modern processor design: fundamentals of superscalar processors","author":"Paul Shen J.","year":"2013","unstructured":"J. Paul Shen & M.H. Lipasti . 2005. Modern processor design: fundamentals of superscalar processors . London : McGraw-Hill. Reissued by Waveland Press , Inc. in 2013 . ISBN 978-1-4786-0783-0 J. Paul Shen & M.H. Lipasti. 2005. Modern processor design: fundamentals of superscalar processors. London: McGraw-Hill. Reissued by Waveland Press, Inc. in 2013. ISBN 978-1-4786-0783-0"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack . In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14) . USENIX Association, USA, 719\u2013732. Available online:https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-yarom.pdf [Accessed : 11\/01\/2021] Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, USA, 719\u2013732. Available online:https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-yarom.pdf [Accessed: 11\/01\/2021]"},{"unstructured":"Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1 2A 2B 2C 3A 3B 3C 3D and 4. Available online: https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-64-and-ia-32-architectures-sdm-combined-volumes-1-2a-2b-2c-2d-3a-3b-3c-3d-and-4.html [Accessed: 11\/01\/2021]  Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1 2A 2B 2C 3A 3B 3C 3D and 4. Available online: https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-64-and-ia-32-architectures-sdm-combined-volumes-1-2a-2b-2c-2d-3a-3b-3c-3d-and-4.html [Accessed: 11\/01\/2021]","key":"e_1_3_2_1_4_1"},{"unstructured":"Locality of reference (Principle of locality). Available online: https:\/\/en.wikipedia.org\/wiki\/Locality_of_reference [Accessed: 11\/01\/2021]  Locality of reference (Principle of locality). Available online: https:\/\/en.wikipedia.org\/wiki\/Locality_of_reference [Accessed: 11\/01\/2021]","key":"e_1_3_2_1_5_1"},{"unstructured":"Meltdown and Spectre: Vulnerabilities in modern computers leak passwords and sensitive data. Available online: https:\/\/meltdownattack.com [Accessed: 11\/01\/2021]  Meltdown and Spectre: Vulnerabilities in modern computers leak passwords and sensitive data. Available online: https:\/\/meltdownattack.com [Accessed: 11\/01\/2021]","key":"e_1_3_2_1_6_1"},{"unstructured":"Intel Software Security Guidance. Available online: https:\/\/software.intel.com\/security-software-guidance\/software-guidance [Accessed: 11\/01\/2021]  Intel Software Security Guidance. Available online: https:\/\/software.intel.com\/security-software-guidance\/software-guidance [Accessed: 11\/01\/2021]","key":"e_1_3_2_1_7_1"}],"event":{"acronym":"icWCSN 2022","name":"icWCSN 2022: 2022 9th international Conference on Wireless Communication and Sensor Networks","location":"Dalian China"},"container-title":["2022 9th international Conference on Wireless Communication and Sensor Networks (ICWCSN)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514105.3514112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:55Z","timestamp":1750186795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":7,"alternative-id":["10.1145\/3514105.3514112","10.1145\/3514105"],"URL":"https:\/\/doi.org\/10.1145\/3514105.3514112","relation":{},"subject":[],"published":{"date-parts":[[2022,1,11]]},"assertion":[{"value":"2022-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}