{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:29Z","timestamp":1763968529443,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1145\/3569562.3569589","type":"proceedings-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T04:09:08Z","timestamp":1695355748000},"page":"53-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5904-2764","authenticated-orcid":false,"given":"Chidera","family":"Biringa","sequence":"first","affiliation":[{"name":"University of Massachusetts Dartmouth, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8565-9880","authenticated-orcid":false,"given":"Baye","family":"Gaspard","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6467-1979","authenticated-orcid":false,"given":"Gokhan","family":"Kul","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.111"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.09.014"},{"key":"e_1_3_2_1_3_1","unstructured":"Arnaldo\u00a0Carvalho De\u00a0Melo. 2010. The new linux\u2019perf\u2019tools. In Slides from Linux Kongress Vol.\u00a018. 1\u201342.  Arnaldo\u00a0Carvalho De\u00a0Melo. 2010. The new linux\u2019perf\u2019tools. In Slides from Linux Kongress Vol.\u00a018. 1\u201342."},{"key":"e_1_3_2_1_4_1","volume-title":"Detecting spectre attacks by identifying cache side-channel attacks using machine learning. Advanced Microkernel Operating Systems 75","author":"Depoix Jonas","year":"2018","unstructured":"Jonas Depoix and Philipp Altmeyer . 2018. Detecting spectre attacks by identifying cache side-channel attacks using machine learning. Advanced Microkernel Operating Systems 75 ( 2018 ). Jonas Depoix and Philipp Altmeyer. 2018. Detecting spectre attacks by identifying cache side-channel attacks using machine learning. Advanced Microkernel Operating Systems 75 (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"Mahidhar Dwarampudi and NV Reddy. 2019. Effects of padding on LSTMs and CNNs. arXiv preprint arXiv:1903.07288(2019).  Mahidhar Dwarampudi and NV Reddy. 2019. Effects of padding on LSTMs and CNNs. arXiv preprint arXiv:1903.07288(2019)."},{"key":"e_1_3_2_1_6_1","volume-title":"15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).","author":"Faraboschi Paolo","year":"2015","unstructured":"Paolo Faraboschi , Kimberly Keeton , Tim Marsland , and Dejan Milojicic . 2015 . Beyond processor-centric operating systems . In 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}). Paolo Faraboschi, Kimberly Keeton, Tim Marsland, and Dejan Milojicic. 2015. Beyond processor-centric operating systems. In 15th Workshop on Hot Topics in Operating Systems (HotOS {XV})."},{"key":"e_1_3_2_1_7_1","unstructured":"Aur\u00e9lien G\u00e9ron. 2019. Hands-on machine learning with Scikit-Learn Keras and TensorFlow: Concepts tools and techniques to build intelligent systems. O\u2019Reilly Media.  Aur\u00e9lien G\u00e9ron. 2019. Hands-on machine learning with Scikit-Learn Keras and TensorFlow: Concepts tools and techniques to build intelligent systems. O\u2019Reilly Media."},{"key":"e_1_3_2_1_8_1","unstructured":"Afshin Gholamy Vladik Kreinovich and Olga Kosheleva. 2018. Why 70\/30 or 80\/20 relation between training and testing sets: a pedagogical explanation. (2018).  Afshin Gholamy Vladik Kreinovich and Olga Kosheleva. 2018. Why 70\/30 or 80\/20 relation between training and testing sets: a pedagogical explanation. (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"Yoav Goldberg and Omer Levy. 2014. word2vec Explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722(2014).  Yoav Goldberg and Omer Levy. 2014. word2vec Explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722(2014)."},{"key":"e_1_3_2_1_10_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative adversarial nets. Advances in neural information processing systems 27 ( 2014 ). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00011"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00036"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380428"},{"volume-title":"Intel White Paper","year":"2018","key":"e_1_3_2_1_14_1","unstructured":"Intel. 2018 . Intel Analysis of Speculative Execution Side Channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf . Intel White Paper , Accessed December, 2021. Intel. 2018. Intel Analysis of Speculative Execution Side Channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf. Intel White Paper, Accessed December, 2021."},{"volume-title":"Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies","author":"Kelleher D","key":"e_1_3_2_1_15_1","unstructured":"John\u00a0 D Kelleher , Brian Mac\u00a0Namee , and Aoife D\u2019arcy . 2020. Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies . MIT press . John\u00a0D Kelleher, Brian Mac\u00a0Namee, and Aoife D\u2019arcy. 2020. Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies. MIT press."},{"key":"e_1_3_2_1_16_1","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757(2018).  Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757(2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"Accessed","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher . 2018 . Spectre Mitigations in Microsoft\u2019s C\/C++ Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html . Accessed December, 2021. Paul Kocher. 2018. Spectre Mitigations in Microsoft\u2019s C\/C++ Compiler. https:\/\/www.paulkocher.com\/doc\/MicrosoftCompilerSpectreMitigation.html. Accessed December, 2021."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_19_1","unstructured":"Ravie Lakshmanan. 2022. New Exploit Bypasses Existing Spectre-V2 Mitigations in Intel AMD Arm CPUs. https:\/\/thehackernews.com\/2022\/03\/new-exploit-bypasses-existing-spectre.html. The Hacker News official website.  Ravie Lakshmanan. 2022. New Exploit Bypasses Existing Spectre-V2 Mitigations in Intel AMD Arm CPUs. https:\/\/thehackernews.com\/2022\/03\/new-exploit-bypasses-existing-spectre.html. The Hacker News official website."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAHPC.2018.8645918"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3082471"},{"key":"e_1_3_2_1_22_1","volume-title":"Meltdown: Reading kernel memory from user space. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 973\u2013990.","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , 2018 . Meltdown: Reading kernel memory from user space. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 973\u2013990. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, 2018. Meltdown: Reading kernel memory from user space. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 973\u2013990."},{"key":"e_1_3_2_1_23_1","volume-title":"ACM SIGARCH","author":"Mark Silberstein","year":"2018","unstructured":"Silberstein Mark , Oleksenko Oleksii , and Fetzer Christof . 2018 . Speculating about speculation: on the (lack of) security guarantees of Spectre-V1 mitigations. shorturl.at\/kmnCU . ACM SIGARCH , Accessed December, 2021. Silberstein Mark, Oleksenko Oleksii, and Fetzer Christof. 2018. Speculating about speculation: on the (lack of) security guarantees of Spectre-V1 mitigations. shorturl.at\/kmnCU. ACM SIGARCH, Accessed December, 2021."},{"key":"e_1_3_2_1_24_1","volume-title":"Google Security Blog","author":"Matt Linton","year":"2018","unstructured":"Linton Matt and Parseghian Pat . 2018 . More details about mitigations for the CPU Speculative Execution issue. https:\/\/security.googleblog.com\/2018\/01\/more-details-about-mitigations-for-cpu_4.html . Google Security Blog , Accessed December, 2021. Linton Matt and Parseghian Pat. 2018. More details about mitigations for the CPU Speculative Execution issue. https:\/\/security.googleblog.com\/2018\/01\/more-details-about-mitigations-for-cpu_4.html. Google Security Blog, Accessed December, 2021."},{"key":"e_1_3_2_1_25_1","volume-title":"Microsoft Security","author":"Myerson Terry","year":"2018","unstructured":"Terry Myerson . 2018 . Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems . Microsoft Security , January 9 (2018). Terry Myerson. 2018. Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems. Microsoft Security, January 9 (2018)."},{"volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 1481\u20131498.","author":"Oleksenko Oleksii","key":"e_1_3_2_1_26_1","unstructured":"Oleksii Oleksenko , Bohdan Trach , Mark Silberstein , and Christof Fetzer . 2020. SpecFuzz: Bringing Spectre-type vulnerabilities to the surface . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1481\u20131498. Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, and Christof Fetzer. 2020. SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1481\u20131498."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702278"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186005"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/645604.662772"},{"key":"e_1_3_2_1_30_1","unstructured":"Zhenxiao Qi Qian Feng Yueqiang Cheng Mengjia Yan Peng Li Heng Yin and Tao Wei. 2021. SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. (2021).  Zhenxiao Qi Qian Feng Yueqiang Cheng Mengjia Yan Peng Li Heng Yin and Tao Wei. 2021. SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. (2021)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240844"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"e_1_3_2_1_33_1","unstructured":"Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education.  Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00047"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3385897","article-title":"Kleespectre: Detecting information leakage through speculative cache attacks via symbolic execution","volume":"29","author":"Wang Guanhua","year":"2020","unstructured":"Guanhua Wang , Sudipta Chattopadhyay , Arnab\u00a0Kumar Biswas , Tulika Mitra , and Abhik Roychoudhury . 2020 . Kleespectre: Detecting information leakage through speculative cache attacks via symbolic execution . ACM Transactions on Software Engineering and Methodology (TOSEM) 29 , 3(2020), 1 \u2013 31 . Guanhua Wang, Sudipta Chattopadhyay, Arnab\u00a0Kumar Biswas, Tulika Mitra, and Abhik Roychoudhury. 2020. Kleespectre: Detecting information leakage through speculative cache attacks via symbolic execution. ACM Transactions on Software Engineering and Methodology (TOSEM) 29, 3(2020), 1\u201331.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_36_1","volume-title":"oo7: Low-overhead defense against spectre attacks via program analysis","author":"Wang Guanhua","year":"2019","unstructured":"Guanhua Wang , Sudipta Chattopadhyay , Ivan Gotovchits , Tulika Mitra , and Abhik Roychoudhury . 2019. oo7: Low-overhead defense against spectre attacks via program analysis . IEEE Transactions on Software Engineering( 2019 ). Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, and Abhik Roychoudhury. 2019. oo7: Low-overhead defense against spectre attacks via program analysis. IEEE Transactions on Software Engineering(2019)."},{"key":"e_1_3_2_1_37_1","volume-title":"Osiris: Automated Discovery of Microarchitectural Side Channels. arXiv preprint arXiv:2106.03470(2021).","author":"Weber Daniel","year":"2021","unstructured":"Daniel Weber , Ahmad Ibrahim , Hamed Nemati , Michael Schwarz , and Christian Rossow . 2021 . Osiris: Automated Discovery of Microarchitectural Side Channels. arXiv preprint arXiv:2106.03470(2021). Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, and Christian Rossow. 2021. Osiris: Automated Discovery of Microarchitectural Side Channels. arXiv preprint arXiv:2106.03470(2021)."},{"key":"e_1_3_2_1_38_1","volume-title":"Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136.","author":"Zhang Yunjie","year":"2020","unstructured":"Yunjie Zhang and Yiorgos Makris . 2020 . Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136. Yunjie Zhang and Yiorgos Makris. 2020. Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136."}],"event":{"name":"HASP '22: Hardware and Architectural Support for Security and Privacy","acronym":"HASP '22","location":"Chicago IL USA"},"container-title":["Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569562.3569589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:57Z","timestamp":1750182537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":38,"alternative-id":["10.1145\/3569562.3569589","10.1145\/3569562"],"URL":"https:\/\/doi.org\/10.1145\/3569562.3569589","relation":{},"subject":[],"published":{"date-parts":[[2022,10]]},"assertion":[{"value":"2023-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}