{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:10:05Z","timestamp":1755853805495,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2860.001"],"award-info":[{"award-number":["2860.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3559516","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Software Timing Attack Evaluation &amp; Mitigation on Clear Hardware Assumption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-4200","authenticated-orcid":false,"given":"Prabuddha","family":"Chakraborty","sequence":"first","affiliation":[{"name":"University of Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 53\u201370.","author":"Almeida Jos\u00e9\u00a0Bacelar","key":"e_1_3_2_1_1_1","unstructured":"Jos\u00e9\u00a0Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Fran\u00e7ois Dupressoir, and Michael Emmi. 2016. Verifying constant-time implementations. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 53\u201370."},{"key":"e_1_3_2_1_2_1","unstructured":"Daniel\u00a0J Bernstein. 2005. Cache-timing attacks on AES. (2005)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00022"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_1_5_1","volume-title":"HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption","author":"Chakraborty Prabuddha","year":"2021","unstructured":"Prabuddha Chakraborty, Jonathan Cruz, Christopher Posada, Sandip Ray, and Swarup Bhunia. 2021. HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption. IEEE Embedded Systems Letters(2021)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_7_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Reparaz Oscar","year":"2017","unstructured":"Oscar Reparaz, Josep Balasch, and Ingrid Verbauwhede. 2017. Dude, is my code constant time?. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE, 1697\u20131702."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892230"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274741"},{"key":"e_1_3_2_1_10_1","volume-title":"SonicBOOM: The 3rd Generation Berkeley Out-of-Order Machine. (May","author":"Zhao Jerry","year":"2020","unstructured":"Jerry Zhao, Ben Korpan, Abraham Gonzalez, and Krste Asanovic. 2020. SonicBOOM: The 3rd Generation Berkeley Out-of-Order Machine. (May 2020)."}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:36:22Z","timestamp":1755851782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":10,"alternative-id":["10.1145\/3551349.3559516","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3559516","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}