{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:24Z","timestamp":1750219944431,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Research Council","award":["2018-05254"],"award-info":[{"award-number":["2018-05254"]}]},{"name":"Microsoft Research EMEA PhD Scholarship Programme","award":["2021-020"],"award-info":[{"award-number":["2021-020"]}]},{"name":"VINNOVA","award":["2021-02422"],"award-info":[{"award-number":["2021-02422"]}]},{"name":"Swedish Foundation for Strategic Research","award":["FUS21-0067"],"award-info":[{"award-number":["FUS21-0067"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1145\/3569562.3569566","type":"proceedings-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T04:09:08Z","timestamp":1695355748000},"page":"27-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Clueless: A Tool Characterising Values Leaking as Addresses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0727-3023","authenticated-orcid":false,"given":"Xiaoyue","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Information Technology, Uppsala University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6602-1988","authenticated-orcid":false,"given":"Pavlos","family":"Aimoniotis","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Uppsala University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8267-0232","authenticated-orcid":false,"given":"Stefanos","family":"Kaxiras","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Uppsala University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Pin - a dynamic binary instrumentation tool. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/tool\/pin-a-dynamic-binary-instrumentation-tool.html  [n. d.]. Pin - a dynamic binary instrumentation tool. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/tool\/pin-a-dynamic-binary-instrumentation-tool.html"},{"key":"e_1_3_2_1_2_1","volume-title":"RSA conference. Springer, 271\u2013286","author":"Ac\u0131i\u00e7mez Onur","year":"2007","unstructured":"Onur Ac\u0131i\u00e7mez , Werner Schindler , and \u00c7etin\u00a0 K Ko\u00e7 . 2007 . Cache based remote timing attack on the AES. In Cryptographers\u2019 track at the RSA conference. Springer, 271\u2013286 . Onur Ac\u0131i\u00e7mez, Werner Schindler, and \u00c7etin\u00a0K Ko\u00e7. 2007. Cache based remote timing attack on the AES. In Cryptographers\u2019 track at the RSA conference. Springer, 271\u2013286."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2021.3123408"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480074"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_10_1","unstructured":"Shay Gueron. 2010. Intel advanced encryption standard (AES) new instructions set.  Shay Gueron. 2010. Intel advanced encryption standard (AES) new instructions set."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_2"},{"key":"e_1_3_2_1_14_1","unstructured":"jannh@google.com. 2018. Issue 1528: speculative execution variant 4: speculative store bypass - project-zero. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528  jannh@google.com. 2018. Issue 1528: speculative execution variant 4: speculative store bypass - project-zero. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528"},{"key":"e_1_3_2_1_15_1","volume-title":"Speculative Buffer Overflows: Attacks and Defenses. arXiv:1807.03757 [cs] (July","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger . 2018. Speculative Buffer Overflows: Attacks and Defenses. arXiv:1807.03757 [cs] (July 2018 ). http:\/\/arxiv.org\/abs\/1807.03757 Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative Buffer Overflows: Attacks and Defenses. arXiv:1807.03757 [cs] (July 2018). http:\/\/arxiv.org\/abs\/1807.03757"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181313"},{"key":"e_1_3_2_1_18_1","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Koruyeh Esmaeil\u00a0Mohammadian","year":"2018","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh , Khaled\u00a0 N Khasawneh , Chengyu Song , and Nael Abu-Ghazaleh . 2018 . speculation attacks using the return stack buffer . In 12th USENIX Workshop on Offensive Technologies (WOOT 18) . Esmaeil\u00a0Mohammadian Koruyeh, Khaled\u00a0N Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. speculation attacks using the return stack buffer. In 12th USENIX Workshop on Offensive Technologies (WOOT 18)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.6"},{"key":"e_1_3_2_1_20_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , 2018 . Meltdown: Reading kernel memory from user space . In 27th USENIX Security Symposium (USENIX Security 18) . 973\u2013990. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, 2018. Meltdown: Reading kernel memory from user space. In 27th USENIX Security Symposium (USENIX Security 18). 973\u2013990."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_23_1","volume-title":"RSA conference. Springer, 1\u201320","author":"Osvik Dag\u00a0Arne","year":"2006","unstructured":"Dag\u00a0Arne Osvik , Adi Shamir , and Eran Tromer . 2006 . Cache attacks and countermeasures: the case of AES. In Cryptographers\u2019 track at the RSA conference. Springer, 1\u201320 . Dag\u00a0Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In Cryptographers\u2019 track at the RSA conference. Springer, 1\u201320."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1037187.1024404"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"volume-title":"Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732.","author":"Yarom Yuval","key":"e_1_3_2_1_28_1","unstructured":"Yuval Yarom and Katrina Falkner . 2014. Flush+Reload : A High Resolution , Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732. Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"}],"event":{"name":"HASP '22: Hardware and Architectural Support for Security and Privacy","acronym":"HASP '22","location":"Chicago IL USA"},"container-title":["Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569562.3569566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:57Z","timestamp":1750182537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":29,"alternative-id":["10.1145\/3569562.3569566","10.1145\/3569562"],"URL":"https:\/\/doi.org\/10.1145\/3569562.3569566","relation":{},"subject":[],"published":{"date-parts":[[2022,10]]},"assertion":[{"value":"2023-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}