{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:47:20Z","timestamp":1772725640006,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1942888"],"award-info":[{"award-number":["1942888"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1954521"],"award-info":[{"award-number":["1954521"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1801534"],"award-info":[{"award-number":["CNS-1801534"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589100","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9150-0662","authenticated-orcid":false,"given":"Jiyong","family":"Yu","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4964-1170","authenticated-orcid":false,"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Penn State University, University Park, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-5995","authenticated-orcid":false,"given":"Christopher Wardlaw","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Awesome SGX Open Source Projects. https:\/\/github.com\/Maxul\/Awesome-SGX-Open-Source.  2022. Awesome SGX Open Source Projects. https:\/\/github.com\/Maxul\/Awesome-SGX-Open-Source."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Mbed-TLS: An open source portable easy to use readable and flexible SSL library. https:\/\/github.com\/ARMmbed\/mbedtls.  2022. Mbed-TLS: An open source portable easy to use readable and flexible SSL library. https:\/\/github.com\/ARMmbed\/mbedtls."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_5_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP). IEEE, 870--887","author":"Aldaya Alejandro Cabrera","year":"2019","unstructured":"Alejandro Cabrera Aldaya , Billy Bob Brumley , Sohaib ul Hassan , Cesar Pereida Garc\u00eda , and Nicola Tuveri . 2019 . Port contention for fun and profit . In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 870--887 . Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2019. Port contention for fun and profit. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 870--887."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative technology for CPU based attestation and sealing . In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy , Vol. 13 . ACM New York, NY, USA, 7. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, Vol. 13. ACM New York, NY, USA, 7."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"e_1_3_2_1_8_1","volume-title":"2016 IEEE European symposium on security and privacy (EuroS&P). IEEE, 261--275","author":"Ashokkumar C","year":"2016","unstructured":"C Ashokkumar , Ravi Prakash Giri , and Bernard Menezes . 2016 . Highly efficient algorithms for AES key retrieval in cache access attacks . In 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE, 261--275 . C Ashokkumar, Ravi Prakash Giri, and Bernard Menezes. 2016. Highly efficient algorithms for AES key retrieval in cache access attacks. In 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE, 261--275."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168833"},{"key":"e_1_3_2_1_10_1","volume-title":"Fast constant-time gcd computation and modular inversion. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Bernstein Daniel J","year":"2019","unstructured":"Daniel J Bernstein and Bo-Yin Yang . 2019. Fast constant-time gcd computation and modular inversion. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2019 ), 340--398. Daniel J Bernstein and Bo-Yin Yang. 2019. Fast constant-time gcd computation and modular inversion. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 340--398."},{"key":"e_1_3_2_1_11_1","volume-title":"Fact: A flexible, constant-time programming language. In 2017 IEEE Cybersecurity Development (SecDev)","author":"Cauligi Sunjay","year":"2017","unstructured":"Sunjay Cauligi , Gary Soeller , Fraser Brown , Brian Johannesmeyer , Yunlu Huang , Ranjit Jhala , and Deian Stefan . 2017 . Fact: A flexible, constant-time programming language. In 2017 IEEE Cybersecurity Development (SecDev) . IEEE , 69--76. Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, and Deian Stefan. 2017. Fact: A flexible, constant-time programming language. In 2017 IEEE Cybersecurity Development (SecDev). IEEE, 69--76."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_13_1","volume-title":"SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. In 31st USENIX Security Symposium (USENIX Security'22)","author":"Chen Yuan","year":"2022","unstructured":"Yuan Chen , Jiaqi Li , Guorui Xu , Yajin Zhou , Zhi Wang , Cong Wang , and Kui Ren . 2022 . SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. In 31st USENIX Security Symposium (USENIX Security'22) . 4129--4146. Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, and Kui Ren. 2022. SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. In 31st USENIX Security Symposium (USENIX Security'22). 4129--4146."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","volume":"2","author":"Chen Yun","year":"2023","unstructured":"Yun Chen , Lingfeng Pei , and Trevor E Carlson . 2023 . AfterImage: Leaking Control Flow Data and Tracking Load Operations via the Hardware Prefetcher . In Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems , Volume 2 . 16--32. Yun Chen, Lingfeng Pei, and Trevor E Carlson. 2023. AfterImage: Leaking Control Flow Data and Tracking Load Operations via the Hardware Prefetcher. In Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2. 16--32."},{"key":"e_1_3_2_1_15_1","unstructured":"Intel Corporation. 2016. Intel\u00ae Software Guard Extensions SDK for Linux* OS (Developer Reference). (2016).  Intel Corporation. 2016. Intel\u00ae Software Guard Extensions SDK for Linux* OS (Developer Reference). (2016)."},{"key":"e_1_3_2_1_16_1","volume-title":"Cacheaudit: A tool for the static analysis of cache side channels. ACM Transactions on information and system security (TISSEC) 18, 1","author":"Doychev Goran","year":"2015","unstructured":"Goran Doychev , Boris K\u00f6pf , Laurent Mauborgne , and Jan Reineke . 2015 . Cacheaudit: A tool for the static analysis of cache side channels. ACM Transactions on information and system security (TISSEC) 18, 1 (2015), 1--32. Goran Doychev, Boris K\u00f6pf, Laurent Mauborgne, and Jan Reineke. 2015. Cacheaudit: A tool for the static analysis of cache side channels. ACM Transactions on information and system security (TISSEC) 18, 1 (2015), 1--32."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_1_18_1","volume-title":"ECE, and Dmitry Ponomarev.","author":"Evtyushkin Dmitry","year":"2018","unstructured":"Dmitry Evtyushkin , Ryan Riley , Nael CSE Abu-Ghazaleh , ECE, and Dmitry Ponomarev. 2018 . BranchScope: A New Side-Channel Attack on Directional Branch Predictor . (2018), 693--707. Dmitry Evtyushkin, Ryan Riley, Nael CSE Abu-Ghazaleh, ECE, and Dmitry Ponomarev. 2018. BranchScope: A New Side-Channel Attack on Directional Branch Predictor. (2018), 693--707."},{"key":"e_1_3_2_1_19_1","volume-title":"27th USENIX Security Symposium (USENIX Security'18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2018 . Translation leak-aside buffer: Defeating cache side-channel protections with TLB attacks . In 27th USENIX Security Symposium (USENIX Security'18) . 955--972. Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation leak-aside buffer: Defeating cache side-channel protections with TLB attacks. In 27th USENIX Security Symposium (USENIX Security'18). 955--972."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.11"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_23_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC'17)","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . 2017 . High-resolution side channels for untrusted operating systems . In 2017 USENIX Annual Technical Conference (USENIX ATC'17) . 299--312. Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-resolution side channels for untrusted operating systems. In 2017 USENIX Annual Technical Conference (USENIX ATC'17). 299--312."},{"issue":"9","key":"e_1_3_2_1_24_1","first-page":"203","article-title":"Advanced Techniques for Instruction Delivery and Speculation. In Computer architecture: a quantitative approach","volume":"3","author":"Hennessy John L","year":"2011","unstructured":"John L Hennessy and David A Patterson . 2011 . Advanced Techniques for Instruction Delivery and Speculation. In Computer architecture: a quantitative approach . Elsevier, Chapter 3 . 9 , 203 -- 206 . John L Hennessy and David A Patterson. 2011. Advanced Techniques for Instruction Delivery and Speculation. In Computer architecture: a quantitative approach. Elsevier, Chapter 3.9, 203--206.","journal-title":"Elsevier, Chapter"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 3rd Workshop on System Software for Trusted Execution. 42--47","author":"Hosseinzadeh Shohreh","year":"2018","unstructured":"Shohreh Hosseinzadeh , Hans Liljestrand , Ville Lepp\u00e4nen , and Andrew Paverd . 2018 . Mitigating branch-shadowing attacks on Intel SGX using control flow randomization . In Proceedings of the 3rd Workshop on System Software for Trusted Execution. 42--47 . Shohreh Hosseinzadeh, Hans Liljestrand, Ville Lepp\u00e4nen, and Andrew Paverd. 2018. Mitigating branch-shadowing attacks on Intel SGX using control flow randomization. In Proceedings of the 3rd Workshop on System Software for Trusted Execution. 42--47."},{"key":"e_1_3_2_1_26_1","volume-title":"Bluethunder: A 2-level directional predictor based side-channel attack against sgx. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Huo Tianlin","year":"2020","unstructured":"Tianlin Huo , Xiaoni Meng , Wenhao Wang , Chunliang Hao , Pei Zhao , Jian Zhai , and Mingshu Li . 2020 . Bluethunder: A 2-level directional predictor based side-channel attack against sgx. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 321--347. Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, and Mingshu Li. 2020. Bluethunder: A 2-level directional predictor based side-channel attack against sgx. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 321--347."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. 2018. Indirect Branch Predictor Barrier. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-predictor-barrier.html.  Intel. 2018. Indirect Branch Predictor Barrier. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-predictor-barrier.html."},{"key":"e_1_3_2_1_28_1","unstructured":"Intel. 2018. Indirect Branch Restricted Speculation. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-restricted-speculation.html.  Intel. 2018. Indirect Branch Restricted Speculation. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-restricted-speculation.html."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel. 2018. Intel 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/intel.ly\/2UbLwk2.  Intel. 2018. Intel 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/intel.ly\/2UbLwk2."},{"key":"e_1_3_2_1_30_1","unstructured":"Intel. 2018. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Protected Code Loader (PCL) for Linux. (2018).  Intel. 2018. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) Protected Code Loader (PCL) for Linux. (2018)."},{"key":"e_1_3_2_1_31_1","volume-title":"Intel IPP Crypto Library","year":"2020","unstructured":"Intel. 2020. Intel IPP Crypto Library ( 2020 ). https:\/\/github.com\/intel\/ipp-crypto\/tree\/ipp-crypto_2020. Intel. 2020. Intel IPP Crypto Library (2020). https:\/\/github.com\/intel\/ipp-crypto\/tree\/ipp-crypto_2020."},{"key":"e_1_3_2_1_32_1","unstructured":"Intel. 2022. Intel Trust Domain Extensions. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdxwhitepaper-v4.pdf.  Intel. 2022. Intel Trust Domain Extensions. https:\/\/software.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/tdxwhitepaper-v4.pdf."},{"key":"e_1_3_2_1_33_1","volume-title":"2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 172--182","author":"Ishii Yasuo","year":"2021","unstructured":"Yasuo Ishii , Jaekyu Lee , Krishnendra Nathella , and Dam Sunwoo . 2021 . Reestablishing fetch-directed instruction prefetching: An industry perspective . In 2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 172--182 . Yasuo Ishii, Jaekyu Lee, Krishnendra Nathella, and Dam Sunwoo. 2021. Reestablishing fetch-directed instruction prefetching: An industry perspective. In 2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 172--182."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480079"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_36_1","volume-title":"2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 160--172","author":"Kotra Jagadish B","year":"2020","unstructured":"Jagadish B Kotra and John Kalamatianos . 2020 . Improving the Utilization of Microoperation Caches in x86 Processors . In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 160--172 . Jagadish B Kotra and John Kalamatianos. 2020. Improving the Utilization of Microoperation Caches in x86 Processors. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 160--172."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 3rd Workshop on System Software for Trusted Execution. 14--19","author":"Lazard Titouan","year":"2018","unstructured":"Titouan Lazard , Johannes G\u00f6tzfried , Tilo M\u00fcller , Gianni Santinelli , and Vincent Lefebvre . 2018 . TEEshift: Protecting code confidentiality by selectively shifting functions into TEEs . In Proceedings of the 3rd Workshop on System Software for Trusted Execution. 14--19 . Titouan Lazard, Johannes G\u00f6tzfried, Tilo M\u00fcller, Gianni Santinelli, and Vincent Lefebvre. 2018. TEEshift: Protecting code confidentiality by selectively shifting functions into TEEs. In Proceedings of the 3rd Workshop on System Software for Trusted Execution. 14--19."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404189"},{"key":"e_1_3_2_1_39_1","volume-title":"26th USENIX Security Symposium (USENIX Security'17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring fine-grained control flow inside SGX enclaves with branch shadowing . In 26th USENIX Security Symposium (USENIX Security'17) . 557--574. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In 26th USENIX Security Symposium (USENIX Security'17). 557--574."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. (2013) 1--1.  Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. (2013) 1--1.","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_42_1","volume-title":"CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium (USENIX Security'20)","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi , Jo Van Bulck , Nadia Heninger , Frank Piessens , and Berk Sunar . 2020 . CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium (USENIX Security'20) . 469--486. Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium (USENIX Security'20). 469--486."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_23"},{"key":"e_1_3_2_1_44_1","volume-title":"Cryptographers' track at the RSA conference","author":"Osvik Dag Arne","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006. Cache attacks and countermeasures: the case of AES . In Cryptographers' track at the RSA conference . Springer , 1--20. Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In Cryptographers' track at the RSA conference. Springer, 1--20."},{"key":"e_1_3_2_1_45_1","volume-title":"30th USENIX Security Symposium (USENIX Security'21)","author":"Paccagnella Riccardo","year":"2021","unstructured":"Riccardo Paccagnella , Licheng Luo , and Christopher W Fletcher . 2021 . Lord of the Ring (s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical . In 30th USENIX Security Symposium (USENIX Security'21) . 645--662. Riccardo Paccagnella, Licheng Luo, and Christopher W Fletcher. 2021. Lord of the Ring (s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. In 30th USENIX Security Symposium (USENIX Security'21). 645--662."},{"key":"e_1_3_2_1_46_1","volume-title":"30th USENIX Security Symposium (USENIX Security'21)","author":"Puddu Ivan","year":"2021","unstructured":"Ivan Puddu , Moritz Schneider , Miro Haller , and Srdjan \u010dapkun . 2021 . Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend . In 30th USENIX Security Symposium (USENIX Security'21) . 663--680. Ivan Puddu, Moritz Schneider, Miro Haller, and Srdjan \u010dapkun. 2021. Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. In 30th USENIX Security Symposium (USENIX Security'21). 663--680."},{"key":"e_1_3_2_1_47_1","volume-title":"arXiv preprint arXiv:2212.07899","author":"Puddu Ivan","year":"2022","unstructured":"Ivan Puddu , Moritz Schneider , Daniele Lain , Stefano Boschetto , and Srdjan \u010dapkun . 2022. On (the Lack of) Code Confidentiality in Trusted Execution Environments . arXiv preprint arXiv:2212.07899 ( 2022 ). Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, and Srdjan \u010dapkun. 2022. On (the Lack of) Code Confidentiality in Trusted Execution Environments. arXiv preprint arXiv:2212.07899 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"24th USENIX Security Symposium (USENIX Security'15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing digital side-channels through obfuscated execution . In 24th USENIX Security Symposium (USENIX Security'15) . 431--446. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing digital side-channels through obfuscated execution. In 24th USENIX Security Symposium (USENIX Security'15). 431--446."},{"key":"e_1_3_2_1_49_1","volume-title":"2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)","volume":"4","author":"Roy Bholanath","year":"2015","unstructured":"Bholanath Roy , Ravi Prakash Giri , C Ashokkumar , and Bernard Menezes . 2015 . Design and implementation of an espionage network for cache-based side channel attacks on AES . In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) , Vol. 4 . IEEE, 441--447. Bholanath Roy, Ravi Prakash Giri, C Ashokkumar, and Bernard Menezes. 2015. Design and implementation of an espionage network for cache-based side channel attacks on AES. In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), Vol. 4. IEEE, 441--447."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_51_1","volume-title":"2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 318--331","author":"Skarlatos Dimitrios","year":"2019","unstructured":"Dimitrios Skarlatos , Mengjia Yan , Bhargava Gopireddy , Read Sprabery , Josep Torrellas , and Christopher W Fletcher . 2019 . Microscope: Enabling microarchitectural replay attacks . In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 318--331 . Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, and Christopher W Fletcher. 2019. Microscope: Enabling microarchitectural replay attacks. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, 318--331."},{"key":"e_1_3_2_1_52_1","unstructured":"A. Smith and B. Johnson. 1998. Method and apparatus for implementing a set associative branch target buffer.  A. Smith and B. Johnson. 1998. Method and apparatus for implementing a set associative branch target buffer."},{"key":"e_1_3_2_1_53_1","volume-title":"USENIX Security Symposium. 239--256","author":"Tsafrir Dan","year":"2007","unstructured":"Dan Tsafrir , Yoav Etsion , and Dror G Feitelson . 2007 . Secretly Monopolizing the CPU Without Superuser Privileges .. In USENIX Security Symposium. 239--256 . Dan Tsafrir, Yoav Etsion, and Dror G Feitelson. 2007. Secretly Monopolizing the CPU Without Superuser Privileges.. In USENIX Security Symposium. 239--256."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_1_56_1","volume-title":"26th USENIX Security Symposium (USENIX Security'17)","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In 26th USENIX Security Symposium (USENIX Security'17) . 1041--1056. Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In 26th USENIX Security Symposium (USENIX Security'17). 1041--1056."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00064"},{"key":"e_1_3_2_1_58_1","volume-title":"2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 347--360","author":"Sanchez Vicarte Jose Rodrigo","year":"2021","unstructured":"Jose Rodrigo Sanchez Vicarte , Pradyumna Shome , Nandeeka Nayak , Caroline Trippel , Adam Morrison , David Kohlbrenner , and Christopher W Fletcher . 2021 . Opening pandora's box: A systematic study of new ways microarchitecture can leak private data . In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 347--360 . Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, and Christopher W Fletcher. 2021. Opening pandora's box: A systematic study of new ways microarchitecture can leak private data. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 347--360."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 56th Annual Design Automation Conference","author":"Wang Daimeng","year":"2019","unstructured":"Daimeng Wang , Zhiyun Qian , Nael Abu-Ghazaleh , and Srikanth V Krishnamurthy . 2019 . Papp: Prefetcher-aware prime and probe side-channel attack . In Proceedings of the 56th Annual Design Automation Conference 2019. 1--6. Daimeng Wang, Zhiyun Qian, Nael Abu-Ghazaleh, and Srikanth V Krishnamurthy. 2019. Papp: Prefetcher-aware prime and probe side-channel attack. In Proceedings of the 56th Annual Design Automation Conference 2019. 1--6."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274741"},{"key":"e_1_3_2_1_62_1","unstructured":"WikiChip. 2020. Macro-Operation Fusion (MOP Fusion). https:\/\/en.wikichip.org\/wiki\/macro-operation_fusion..  WikiChip. 2020. Macro-Operation Fusion (MOP Fusion). https:\/\/en.wikichip.org\/wiki\/macro-operation_fusion.."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_65_1","volume-title":"23rd USENIX Security Symposium (USENIX Security'14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In 23rd USENIX Security Symposium (USENIX Security'14) . 719--732. Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX Security Symposium (USENIX Security'14). 719--732."},{"key":"e_1_3_2_1_66_1","volume-title":"Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. In 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 133--144","author":"Yu Jiyong","year":"2022","unstructured":"Jiyong Yu , Xinyang Ge , Trent Jaeger , Christopher W Fletcher , and Weidong Cui . 2022 . Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. In 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 133--144 . Jiyong Yu, Xinyang Ge, Trent Jaeger, Christopher W Fletcher, and Weidong Cui. 2022. Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. In 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 133--144."},{"key":"e_1_3_2_1_67_1","unstructured":"Jiyong Yu Lucas Hsiung Mohamad El'Hajj and Christopher W Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. (2019).  Jiyong Yu Lucas Hsiung Mohamad El'Hajj and Christopher W Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. (2019)."},{"key":"e_1_3_2_1_68_1","first-page":"1153","article-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation","volume":"2015","author":"Zahur Samee","year":"2015","unstructured":"Samee Zahur and David Evans . 2015 . Obliv-C: A Language for Extensible Data-Oblivious Computation . IACR Cryptol. ePrint Arch. 2015 (2015), 1153 . Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. IACR Cryptol. ePrint Arch. 2015 (2015), 1153.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems. 667--682","author":"Zhang Tao","year":"2020","unstructured":"Tao Zhang , Kenneth Koltermann , and Dmitry Evtyushkin . 2020 . Exploring branch predictors for constructing transient execution trojans . In Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems. 667--682 . Tao Zhang, Kenneth Koltermann, and Dmitry Evtyushkin. 2020. Exploring branch predictors for constructing transient execution trojans. In Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems. 667--682."},{"key":"e_1_3_2_1_70_1","volume-title":"2021 58th ACM\/IEEE Design Automation Conference (DAC). IEEE, 1267--1272","author":"Zhao Lutan","year":"2021","unstructured":"Lutan Zhao , Peinan Li , Rui Hou , Michael C Huang , Jiazhen Li , Lixin Zhang , Xuehai Qian , and Dan Meng . 2021 . A lightweight isolation mechanism for secure branch predictors . In 2021 58th ACM\/IEEE Design Automation Conference (DAC). IEEE, 1267--1272 . Lutan Zhao, Peinan Li, Rui Hou, Michael C Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, and Dan Meng. 2021. A lightweight isolation mechanism for secure branch predictors. In 2021 58th ACM\/IEEE Design Automation Conference (DAC). IEEE, 1267--1272."}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","location":"Orlando FL USA","acronym":"ISCA '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"]},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:40Z","timestamp":1750178800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":70,"alternative-id":["10.1145\/3579371.3589100","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589100","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}