{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:40:23Z","timestamp":1773193223640,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616643","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"945-959","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Verification of Low-Trust Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2475-3675","authenticated-orcid":false,"given":"Qinhan","family":"Tan","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9645-2885","authenticated-orcid":false,"given":"Yonathan","family":"Fisseha","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9522-8934","authenticated-orcid":false,"given":"Shibo","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8511-2287","authenticated-orcid":false,"given":"Lauren","family":"Biernacki","sequence":"additional","affiliation":[{"name":"Lafayette College, Easton, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6378-1447","authenticated-orcid":false,"given":"Jean-Baptiste","family":"Jeannin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0837-5443","authenticated-orcid":false,"given":"Sharad","family":"Malik","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0181-0852","authenticated-orcid":false,"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Knownplaintext_ attack","year":"2023","unstructured":"2023. Known-plaintext Attack. (2023). https:\/\/en.wikipedia.org\/wiki\/Knownplaintext_ attack"},{"key":"e_1_3_2_1_2_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Alam Monjur","year":"2018","unstructured":"Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, and Milos Prvulovic. 2018. One&Done: A Single-Decryption EMBased Attack on OpenSSL's Constant-Time Blinded RSA. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 585--602. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/alam"},{"key":"e_1_3_2_1_3_1","volume-title":"Trustzone: Integrated Hardware and Software Security https:\/\/www.techonline.com\/tech-papers\/trustzone-integrated-hardwareand-software-security\/. White paper","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves. 2004. Trustzone: Integrated Hardware and Software Security https:\/\/www.techonline.com\/tech-papers\/trustzone-integrated-hardwareand-software-security\/. White paper (2004). https:\/\/www.techonline.com\/techpapers\/ trustzone-integrated-hardware-and-software-security\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU based Attestation and Sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. 13. ACM New York, NY, USA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203772"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3130379.3130775"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"e_1_3_2_1_8_1","volume-title":"An Overview of Hardware Security Modules","author":"Attridge Jim","year":"2002","unstructured":"Jim Attridge. 2002. An Overview of Hardware Security Modules. SANS Institute. Information Security Reading Room (2002)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2017.i1.4-44"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23696-0_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9089-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00014"},{"key":"e_1_3_2_1_14_1","volume-title":"Hacking Blind. In 2014 IEEE Symposium on Security and Privacy. IEEE, 227--242","author":"Bittau Andrea","year":"2014","unstructured":"Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi\u00e8res, and Dan Boneh. 2014. Hacking Blind. In 2014 IEEE Symposium on Security and Privacy. IEEE, 227--242."},{"key":"e_1_3_2_1_15_1","volume-title":"KeyNote: Trust Management for Public-Key Infrastructures. In International Workshop on Security Protocols. Springer, 59--63","author":"Blaze Matt","year":"1998","unstructured":"Matt Blaze, Joan Feigenbaum, and Angelos D Keromytis. 1998. KeyNote: Trust Management for Public-Key Infrastructures. In International Workshop on Security Protocols. Springer, 59--63."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266979"},{"key":"e_1_3_2_1_18_1","volume-title":"Dieharder: A Random Number Test Suite.","author":"Brown Robert G","year":"2018","unstructured":"Robert G Brown. 2018. Dieharder: A Random Number Test Suite. (2018). https:\/\/webhome.phy.duke.edu\/~rgb\/General\/dieharder.php"},{"key":"e_1_3_2_1_19_1","unstructured":"Cadence. 2022. JasperGold Security Path Verification. https:\/\/www.cadence. com\/en_US\/home\/tools\/system-design-and-verification\/formal-and-staticverification\/ jasper-gold-verification-platform\/security-path-verificationapp.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Scalable Architectural Support for Trusted Software. In HPCA-16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture. IEEE, 1--12","author":"Champagne David","year":"2010","unstructured":"David Champagne and Ruby B Lee. 2010. Scalable Architectural Support for Trusted Software. In HPCA-16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture. IEEE, 1--12."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"e_1_3_2_1_22_1","volume-title":"Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_23_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). 857--874."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.129465"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218572"},{"key":"e_1_3_2_1_26_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 994--999","author":"Fadiheh Mohammad Rahmani","year":"2019","unstructured":"Mohammad Rahmani Fadiheh, Dominik Stoffel, Clark Barrett, Subhasish Mitra, and Wolfgang Kunz. 2019. Processor Hardware Security Vulnerabilities and Their Detection by Unique Program Execution Checking. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 994--999."},{"key":"e_1_3_2_1_27_1","volume-title":"Secure Information Flow Verification with Mutable Dependent Types. In 2017 54th ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE, 1--6.","author":"Ferraiuolo Andrew","year":"2017","unstructured":"Andrew Ferraiuolo, Weizhe Hua, Andrew C Myers, and G Edward Suh. 2017. Secure Information Flow Verification with Mutable Dependent Types. In 2017 54th ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE, 1--6."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037739"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"e_1_3_2_1_31_1","volume-title":"IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Gleissenthall Klaus","year":"2019","unstructured":"Klaus v Gleissenthall, Rami G\u00f6khan K\u0131c\u0131, Deian Stefan, and Ranjit Jhala. 2019. IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19). 1411--1428."},{"key":"e_1_3_2_1_32_1","volume-title":"Security Policies and Security Models. In 1982 IEEE Symposium on Security and Privacy. IEEE, 11--11","author":"Goguen Joseph A","year":"1982","unstructured":"Joseph A Goguen and Jos\u00e9 Meseguer. 1982. Security Policies and Security Models. In 1982 IEEE Symposium on Security and Privacy. IEEE, 11--11."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Information Security and Cryptology. 176--192","author":"Gro\u00dfsch\u00e4dl Johann","year":"2009","unstructured":"Johann Gro\u00dfsch\u00e4dl, Elisabeth Oswald, Dan Page, and Michael Tunstall. 2009. Side-channel Analysis of Cryptographic Software via Early-terminating Multiplications. In International Conference on Information Security and Cryptology. 176--192."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00036"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.052"},{"key":"e_1_3_2_1_38_1","volume-title":"Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In 9th EUROMICRO conference on digital system design (DSD'06)","author":"Hamalainen Panu","year":"2006","unstructured":"Panu Hamalainen, Timo Alho, Marko Hannikainen, and Timo D Hamalainen. 2006. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In 9th EUROMICRO conference on digital system design (DSD'06). IEEE, 577--583."},{"key":"e_1_3_2_1_39_1","unstructured":"Ziyad Hanna. 2013. Jasper Case Study on Formally Verifying Secure On-Chip Datapaths. https:\/\/www.deepchip.com\/items\/0524-03.html. https:\/\/www.deepchip. com\/items\/0524-03.html"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Ben Harris. 2006. RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. Technical Report.","DOI":"10.17487\/rfc4432"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Russell Housley Warwick Ford William Polk and David Solo. 1999. Internet X. 509 Public Key Infrastructure Certificate and CRL Profile https:\/\/www.rfc-editor.org\/rfc\/rfc5280.html. Technical Report.","DOI":"10.17487\/rfc2459"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447867"},{"key":"e_1_3_2_1_44_1","volume-title":"Pre-World War I Through World War II","author":"James Wyllie Tony Sale","year":"1944","unstructured":"Tony Sale James Wyllie. 1944. A Cryptographic Dictionary. NR 4559, Historic Cryptographic Collection, Pre-World War I Through World War II, Record Group 457 (1944). https:\/\/www.codesandciphers.org.uk\/documents\/cryptdict\/cryptix.htm"},{"key":"e_1_3_2_1_45_1","volume-title":"Introduction to modern cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell. 2020. Introduction to modern cryptography. CRC press."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806645"},{"key":"e_1_3_2_1_47_1","volume-title":"Qi Jie Wang, and Hui Cao","author":"Kim Kyungduk","year":"2021","unstructured":"Kyungduk Kim, Stefan Bittner, Yongquan Zeng, Stefano Guazzotti, Ortwin Hess, Qi Jie Wang, and Hui Cao. 2021. Massively Parallel Ultrafast Random Bit Generation with a Chip-scale Laser. Science 371, 6532 (2021), 948--952."},{"key":"e_1_3_2_1_48_1","volume-title":"A Formally Verified Cryptographic Extension to a RISC-V Processor. Computer Architecture Research with RISC-V-CARRV 2018","author":"Kiniry Joseph R","year":"2018","unstructured":"Joseph R Kiniry, Daniel M Zimmerman, Robert Dockins, and Rishiyur Nikhil. 2018. A Formally Verified Cryptographic Extension to a RISC-V Processor. Computer Architecture Research with RISC-V-CARRV 2018 (2018)."},{"key":"e_1_3_2_1_49_1","volume-title":"Differential Power Analysis. In Advances in Cryptology-CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings 19","author":"Kocher Paul","year":"1999","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology-CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings 19. Springer, 388--397."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2014.7008853"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium. 717--732","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.. In USENIX Security Symposium. 717--732."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560682"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_55_1","volume-title":"DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021. DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1397--1414. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/loughlin"},{"key":"e_1_3_2_1_56_1","volume-title":"Information Security and Cryptology-ICISC 2002: 5th International Conference Seoul, Korea","author":"Mangard Stefan","year":"2002","unstructured":"Stefan Mangard. 2003. A Simple Power-analysis (SPA) Attack on Implementations of the AES Key Expansion. In Information Security and Cryptology-ICISC 2002: 5th International Conference Seoul, Korea, November 28-29, 2002 Revised Papers 5. Springer, 343--358."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_45"},{"key":"e_1_3_2_1_58_1","volume-title":"Innovative Instructions and Software Model for Isolated Execution. Hasp@ isca 10, 1","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. 2013. Innovative Instructions and Software Model for Isolated Execution. Hasp@ isca 10, 1 (2013)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE-B.2017.8192159"},{"key":"e_1_3_2_1_60_1","unstructured":"Andrew Myers. 2011. Proving noninterference for a while-language using smallstep operational semantics. (2011)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2331332"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.847868"},{"key":"e_1_3_2_1_63_1","volume-title":"Sujoy Sinha Roy, and Anupam Chattopadhyay","author":"Ravi Prasanna","year":"2020","unstructured":"Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, and Anupam Chattopadhyay. 2020. Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE\/KEMs using EM-based Physical Attacks. Cryptology ePrint Archive, Paper 2020\/549. https:\/\/eprint.iacr.org\/2020\/549 https:\/\/eprint.iacr.org\/ 2020\/549."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2687463"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 1999. Diffie-hellman Key Agreement Method. Technical Report.","DOI":"10.17487\/rfc2631"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19911188"},{"key":"e_1_3_2_1_67_1","unstructured":"Mike Rosulek. [n. d.]. The Joy of Cryptography. https:\/\/joyofcryptography.com https:\/\/joyofcryptography.com."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/1662658.1662659"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995306.2995307"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00020"},{"key":"e_1_3_2_1_71_1","volume-title":"CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Solt Flavien","year":"2022","unstructured":"Flavien Solt, Ben Gras, and Kaveh Razavi. 2022. CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. In 31st USENIX Security Symposium (USENIX Security 22). 2549--2566."},{"key":"e_1_3_2_1_72_1","volume-title":"AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In ACM International Conference on Supercomputing 25th Anniversary Volume. 357--368","author":"Suh G Edward","year":"2003","unstructured":"G Edward Suh, Dwaine Clarke, Blaise Gassend, Marten Van Dijk, and Srinivas Devadas. 2003. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In ACM International Conference on Supercomputing 25th Anniversary Volume. 357--368."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"e_1_3_2_1_74_1","volume-title":"Security Verification of Low-Trust Architectures. Long Version of CCS 2023 paper","author":"Tan Qinhan","year":"2023","unstructured":"Qinhan Tan, Yonathan Fisseha, Shibo Chen, Jean-Baptiste Jeannin, Sharad Malik, and Todd Austin. 2023. Security Verification of Low-Trust Architectures. Long Version of CCS 2023 paper (2023). http:\/\/arxiv.org\/abs\/2309.00181"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_77_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, and David Kohlbrenner. 2022. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 679--697. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wangyingchen"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1364\/OL.34.001876"},{"key":"e_1_3_2_1_79_1","volume-title":"Sun BluePrints OnLine","author":"Weise Joel","year":"2001","unstructured":"Joel Weise. 2001. Public Key Infrastructure Overview. Sun BluePrints OnLine, August (2001), 1--27."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1144396.1144401"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2004.831480"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019"},{"key":"e_1_3_2_1_83_1","volume-title":"Fletcher","author":"Yu Jiyong","year":"2020","unstructured":"Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, and Christopher W. Fletcher. 2020. Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). 707--720. https:\/\/doi. org\/10.1109\/ISCA45697.2020.00064"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694372"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2013.6662257"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:50:05Z","timestamp":1755741005000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":86,"alternative-id":["10.1145\/3576915.3616643","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616643","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}