{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:30Z","timestamp":1763968530829,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"AFOSR","award":["FA9550-20-1-0402","FA9550-22-1-0511"],"award-info":[{"award-number":["FA9550-20-1-0402","FA9550-22-1-0511"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2046359","CCF-2217099"],"award-info":[{"award-number":["CNS-2046359","CCF-2217099"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589073","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Metior: A Comprehensive Model to Evaluate Obfuscating Side-Channel Defense Schemes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9284-2154","authenticated-orcid":false,"given":"Peter W.","family":"Deutsch","sequence":"first","affiliation":[{"name":"MIT, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1303-2461","authenticated-orcid":false,"given":"Weon Taek","family":"Na","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8468-8409","authenticated-orcid":false,"given":"Thomas","family":"Bourgeat","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3459-5466","authenticated-orcid":false,"given":"Joel S.","family":"Emer","sequence":"additional","affiliation":[{"name":"MIT\/NVIDIA, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-9674","authenticated-orcid":false,"given":"Mengjia","family":"Yan","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00066"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00092"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00026"},{"key":"e_1_3_2_1_5_1","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs .. In OSDI , Vol. 8. 209 -- 224 . Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_6_1","volume-title":"Security Analysis of Cache Replacement Policies. CoRR abs\/1701.06481","author":"Ca\u00f1ones Pablo","year":"2017","unstructured":"Pablo Ca\u00f1ones , Boris K\u00f6pf , and Jan Reineke . 2017. Security Analysis of Cache Replacement Policies. CoRR abs\/1701.06481 ( 2017 ). arXiv:1701.06481 http:\/\/arxiv.org\/abs\/1701.06481 Pablo Ca\u00f1ones, Boris K\u00f6pf, and Jan Reineke. 2017. Security Analysis of Cache Replacement Policies. CoRR abs\/1701.06481 (2017). arXiv:1701.06481 http:\/\/arxiv.org\/abs\/1701.06481"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3288758"},{"key":"e_1_3_2_1_9_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Dai Miles","year":"2022","unstructured":"Miles Dai , Riccardo Paccagnella , Miguel Gomez-Garcia , John McCalpin , and Mengjia Yan . 2022 . Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects . In 31st USENIX Security Symposium (USENIX Security 22) . USENIX Association, Boston, MA, 2857--2874. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/dai Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John McCalpin, and Mengjia Yan. 2022. Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 2857--2874. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/dai"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00075-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378510"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507747"},{"volume-title":"A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors","author":"Domnitser Leonid","key":"e_1_3_2_1_14_1","unstructured":"Leonid Domnitser , Nael Abu-Ghazaleh , and Dmitry Ponomarev . 2010. A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors . In Computer Network Security, Igor Kotenko and Victor Skormin (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 70--85. Leonid Domnitser, Nael Abu-Ghazaleh, and Dmitry Ponomarev. 2010. A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors. In Computer Network Security, Igor Kotenko and Victor Skormin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 70--85."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_1_16_1","volume-title":"CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris Kopf , Laurent Mauborgne , and Jan Reineke . 2013 . CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In 22nd USENIX Security Symposium (USENIX Security 13) . USENIX Association, Washington, D.C., 431--446. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/paper\/doychev Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 431--446. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/paper\/doychev"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037739"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243743"},{"key":"e_1_3_2_1_19_1","unstructured":"Hazem Gamal. 2020. Document Distance. https:\/\/github.com\/Hazem-Gamall\/document-distance.  Hazem Gamal. 2020. Document Distance. https:\/\/github.com\/Hazem-Gamall\/document-distance."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2201.11377"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124546"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056069"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2016.7460507"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315282"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-2009-0397","article-title":"Automatically Deriving Information-Theoretic Bounds for Adaptive Side-Channel Attacks","volume":"19","author":"K\u00f6pf Boris","year":"2011","unstructured":"Boris K\u00f6pf and David Basin . 2011 . Automatically Deriving Information-Theoretic Bounds for Adaptive Side-Channel Attacks . J. Comput. Secur. 19 , 1 (jan 2011), 1--31. Boris K\u00f6pf and David Basin. 2011. Automatically Deriving Information-Theoretic Bounds for Adaptive Side-Channel Attacks. J. Comput. Secur. 19, 1 (jan 2011), 1--31.","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_1_28_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. arXiv preprint arXiv:1801.01207 ( 2018 ). Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv:1801.01207 (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"volume-title":"Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Luo Mulong","key":"e_1_3_2_1_30_1","unstructured":"Mulong Luo , Andrew C. Myers , and G. Edward Suh . 2020 . Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 859--876. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/luo Mulong Luo, Andrew C. Myers, and G. Edward Suh. 2020. Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 859--876. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/luo"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237011"},{"volume-title":"Selected Areas in Cryptography","author":"Neve Michael","key":"e_1_3_2_1_32_1","unstructured":"Michael Neve and Jean-Pierre Seifert . 2006. Advances on Access-driven Cache Attacks on AES . In Selected Areas in Cryptography . Springer . Michael Neve and Jean-Pierre Seifert. 2006. Advances on Access-driven Cache Attacks on AES. In Selected Areas in Cryptography. Springer."},{"key":"e_1_3_2_1_33_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security). USENIX Association.","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security). USENIX Association. Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security). USENIX Association."},{"key":"e_1_3_2_1_34_1","volume-title":"Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache. CoRR abs\/1908.03383","author":"Purnal Antoon","year":"2019","unstructured":"Antoon Purnal and Ingrid Verbauwhede . 2019. Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache. CoRR abs\/1908.03383 ( 2019 ). arXiv:1908.03383 http:\/\/arxiv.org\/abs\/1908.03383 Antoon Purnal and Ingrid Verbauwhede. 2019. Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache. CoRR abs\/1908.03383 (2019). arXiv:1908.03383 http:\/\/arxiv.org\/abs\/1908.03383"},{"key":"e_1_3_2_1_35_1","volume-title":"2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 360--371","author":"Qureshi Moinuddin K","year":"2019","unstructured":"Moinuddin K Qureshi . 2019 . New attacks and defense for encrypted-address cache . In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 360--371 . Moinuddin K Qureshi. 2019. New attacks and defense for encrypted-address cache. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 360--371."},{"key":"e_1_3_2_1_36_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar and Moinuddin Qureshi . 2021 . MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1379--1396. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/saileshwar Gururaj Saileshwar and Moinuddin Qureshi. 2021. MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1379--1396. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/saileshwar"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485963"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830795"},{"key":"e_1_3_2_1_39_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Shahverdi Aria","year":"2021","unstructured":"Aria Shahverdi , Mahammad Shirinov , and Dana Dachman-Soled . 2021 . Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1019--1035. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/shahverdi Aria Shahverdi, Mahammad Shirinov, and Dana Dachman-Soled. 2021. Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1019--1035. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/shahverdi"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"e_1_3_2_1_41_1","volume-title":"Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. Journal of Hardware and Systems Security","author":"Szefer Jakub","year":"2016","unstructured":"Jakub Szefer . 2016. Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. Journal of Hardware and Systems Security ( 2016 ). Jakub Szefer. 2016. Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. Journal of Hardware and Systems Security (2016)."},{"key":"e_1_3_2_1_42_1","volume-title":"2022 USENIX Security Symposium.","author":"Townley Daniel","year":"2022","unstructured":"Daniel Townley , Kerem Ar\u0131kan , Yu David Liu , Dmitry Ponomarev , and Oguz Ergin . 2022 . Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks . In 2022 USENIX Security Symposium. Daniel Townley, Kerem Ar\u0131kan, Yu David Liu, Dmitry Ponomarev, and Oguz Ergin. 2022. Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks. In 2022 USENIX Security Symposium."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046671"},{"key":"e_1_3_2_1_44_1","unstructured":"Paulo Barreto Vincent Rijmen Antoon Bosselaers. [n. d.]. Optimised ANSI C code for the Rijndael cipher. https:\/\/opensource.apple.com\/source\/BerkeleyDB\/BerkeleyDB-15\/db\/crypto\/rijndael\/rijndael-alg-fst.c.auto.html  Paulo Barreto Vincent Rijmen Antoon Bosselaers. [n. d.]. Optimised ANSI C code for the Rijndael cipher. https:\/\/opensource.apple.com\/source\/BerkeleyDB\/BerkeleyDB-15\/db\/crypto\/rijndael\/rijndael-alg-fst.c.auto.html"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835934"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485972"},{"key":"e_1_3_2_1_48_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Werner Mario","year":"2019","unstructured":"Mario Werner , Thomas Unterluggauer , Lukas Giner , Michael Schwarz , Daniel Gruss , and Stefan Mangard . 2019 . {ScatterCache}: Thwarting Cache Attacks via Cache Set Randomization . In 28th USENIX Security Symposium (USENIX Security 19) . 675--692. Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, and Stefan Mangard. 2019. {ScatterCache}: Thwarting Cache Attacks via Cache Set Randomization. In 28th USENIX Security Symposium (USENIX Security 19). 675--692."},{"key":"e_1_3_2_1_49_1","volume-title":"A Case for Maximal Leakage as a Side Channel Leakage Metric. CoRR abs\/2004.08035","author":"Wu Benjamin","year":"2020","unstructured":"Benjamin Wu , Aaron B. Wagner , and G. Edward Suh . 2020. A Case for Maximal Leakage as a Side Channel Leakage Metric. CoRR abs\/2004.08035 ( 2020 ). arXiv:2004.08035 https:\/\/arxiv.org\/abs\/2004.08035 Benjamin Wu, Aaron B. Wagner, and G. Edward Suh. 2020. A Case for Maximal Leakage as a Side Channel Leakage Metric. CoRR abs\/2004.08035 (2020). arXiv:2004.08035 https:\/\/arxiv.org\/abs\/2004.08035"},{"key":"e_1_3_2_1_50_1","volume-title":"23rd USENIX Security Symposium (USENIX Security). USENIX Association.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-channel Attack . In 23rd USENIX Security Symposium (USENIX Security). USENIX Association. Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-channel Attack. In 23rd USENIX Security Symposium (USENIX Security). USENIX Association."},{"key":"e_1_3_2_1_51_1","volume-title":"Automated Side Channel Analysis of Media Software with Manifold Learning. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Yuan Yuanyuan","year":"2022","unstructured":"Yuanyuan Yuan , Qi Pang , and Shuai Wang . 2022 . Automated Side Channel Analysis of Media Software with Manifold Learning. In 31st USENIX Security Symposium (USENIX Security 22) . USENIX Association, Boston, MA, 4419--4436. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/yuan-yuanyuan Yuanyuan Yuan, Qi Pang, and Shuai Wang. 2022. Automated Side Channel Analysis of Media Software with Manifold Learning. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 4419--4436. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/yuan-yuanyuan"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664273"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2487728"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274715"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.36"}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"],"location":"Orlando FL USA","acronym":"ISCA '23"},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:39Z","timestamp":1750178799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":55,"alternative-id":["10.1145\/3579371.3589073","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589073","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}