{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:30:11Z","timestamp":1773246611735,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CCF","award":["2217099"],"award-info":[{"award-number":["2217099"]}]},{"name":"CNS","award":["204635"],"award-info":[{"award-number":["204635"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707243","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"970-986","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["RTL Verification for Secure Speculation Using Contract Shadow Logic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2475-3675","authenticated-orcid":false,"given":"Qinhan","family":"Tan","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8695-5139","authenticated-orcid":false,"given":"Yuheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusett, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8468-8409","authenticated-orcid":false,"given":"Thomas","family":"Bourgeat","sequence":"additional","affiliation":[{"name":"\u00e9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0837-5443","authenticated-orcid":false,"given":"Sharad","family":"Malik","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-9674","authenticated-orcid":false,"given":"Mengjia","family":"Yan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusett, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480074"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.amd.com\/system\/files\/documents\/softwaretechniques-for-managing-speculation.pdf","author":"AMD.","year":"2023","unstructured":"AMD. Software techniques for managing speculation on amd processors. https:\/\/www.amd.com\/system\/files\/documents\/softwaretechniques-for-managing-speculation.pdf, 2023. [Accessed 23-06- 2024]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203772"},{"key":"e_1_3_2_1_5_1","first-page":"503","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Athalye Anish","year":"2022","unstructured":"Anish Athalye, M Frans Kaashoek, and Nickolai Zeldovich. Verifying hardware security modules with {Information-Preserving} refinement. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pages 503--519, 2022."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014170513439"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_10_1","unstructured":"Cadence. Jasper Formal Property Verification App - cadence.com. https:\/\/www.cadence.com\/en_US\/home\/tools\/system-design-andverification\/formal-and-static-verification\/jasper-gold-verificationplatform\/formal-property-verification-app.html. [Accessed 23-06--2024]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_2_1_12_1","volume-title":"Speculative Load Hardening. https:\/\/llvm.org\/docs\/ SpeculativeLoadHardening.html","author":"Carruth Chandler","year":"2018","unstructured":"Chandler Carruth. Speculative Load Hardening. https:\/\/llvm.org\/docs\/ SpeculativeLoadHardening.html, 2018. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385970"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833707"},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/github.com\/ucb-bar\/riscvsodor","author":"Celio Christopher","year":"2013","unstructured":"Christopher Celio. RISCV-Sodor. https:\/\/github.com\/ucb-bar\/riscvsodor, 2013. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00027"},{"issue":"9","key":"e_1_3_2_1_17_1","first-page":"2059","article-title":"Leaking secrets through modern branch predictors in the speculative world","volume":"71","author":"Islam Chowdhuryy Md Hafizul","year":"2021","unstructured":"Md Hafizul Islam Chowdhuryy and Fan Yao. Leaking secrets through modern branch predictors in the speculative world. IEEE Transactions on Computers, 71(9):2059--2072, 2021.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"e_1_3_2_1_19_1","volume-title":"Dask: a python library for parallel and distributed computing. https:\/\/dask.org","year":"2024","unstructured":"Dask. Dask: a python library for parallel and distributed computing. https:\/\/dask.org, 2024. Accessed 8 July 2024."},{"key":"e_1_3_2_1_20_1","volume-title":"Dominik Stoffel, and Wolfgang Kunz. A scalable formal verification methodology for data-oblivious hardware. arXiv preprint arXiv:2308.07757","author":"Deutschmann Lucas","year":"2023","unstructured":"Lucas Deutschmann, Johannes Mueller, Mohammad Rahmani Fadiheh, Dominik Stoffel, and Wolfgang Kunz. A scalable formal verification methodology for data-oblivious hardware. arXiv preprint arXiv:2308.07757, 2023."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218572"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3152666"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421216"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00073"},{"key":"e_1_3_2_1_25_1","first-page":"1411","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Gleissenthall Klaus","year":"2019","unstructured":"Klaus v Gleissenthall, Rami G\u00f6khan K\u0131c\u0131, Deian Stefan, and Ranjit Jhala. IODINE: Verifying Constant-Time execution of hardware. In 28th USENIX Security Symposium (USENIX Security 19), pages 1411--1428, 2019."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45190-5_23"},{"key":"e_1_3_2_1_27_1","first-page":"955","volume-title":"27th USENIX Security Symposium (USENIX Security","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. Translation leak-aside buffer: Defeating cache side-channel protections with TLB attacks. In 27th USENIX Security Symposium (USENIX Security, pages 955--972, 2018."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00036"},{"key":"e_1_3_2_1_29_1","volume-title":"Speculative execution, variant 4: Speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528","author":"Horn Jann","year":"2018","unstructured":"Jann Horn. Speculative execution, variant 4: Speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528, 2018. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2120970"},{"key":"e_1_3_2_1_31_1","volume-title":"Instruction-level abstraction (ILA): A uniform specification for system-on-chip (SoC) verification. ACM Transactions on Design Automation of Electronic Systems (TODAES), 24(1):1--24","author":"Huang Bo-Yuan","year":"2018","unstructured":"Bo-Yuan Huang, Hongce Zhang, Pramod Subramanyan, Yakir Vizel, Aarti Gupta, and Sharad Malik. Instruction-level abstraction (ILA): A uniform specification for system-on-chip (SoC) verification. ACM Transactions on Design Automation of Electronic Systems (TODAES), 24(1):1--24, 2018."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560578"},{"key":"e_1_3_2_1_33_1","volume-title":"in Tokyo Institute of Technology. RIsc-v Dynamic Execution CORE. https:\/\/github.com\/ridecore\/ridecore","author":"Lab Arch","year":"2016","unstructured":"Arch Lab. in Tokyo Institute of Technology. RIsc-v Dynamic Execution CORE. https:\/\/github.com\/ridecore\/ridecore, 2016. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_34_1","volume-title":"Intel Side Channel Vulnerability L1TF. https:\/\/www.intel.com\/ content\/www\/us\/en\/architecture-and-technology\/l1tf.html","year":"2018","unstructured":"Intel. Intel Side Channel Vulnerability L1TF. https:\/\/www.intel.com\/ content\/www\/us\/en\/architecture-and-technology\/l1tf.html, 2018. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_35_1","unstructured":"Intel. Intel Analysis of Speculative Execution Side Channels. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/ articles\/technical\/software-security-guidance\/technicaldocumentation\/ analysis-speculative-execution-side-channels.html 2021. [Accessed 23-06-2024]."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323843"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317903"},{"key":"e_1_3_2_1_38_1","volume-title":"Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky and Carl Waldspurger. Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:1807.03757, 2018."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_40_1","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh, Khaled N Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. Spectre returns! speculation attacks using the return stack buffer. In 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17511-4_20"},{"key":"e_1_3_2_1_42_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher,Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown: Reading kernel memory from user space. In 27th USENIX Security Symposium (USENIX Security 18), 2018."},{"key":"e_1_3_2_1_43_1","first-page":"1397","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. DOLMA: Securing speculation with the principle of transient Non-Observability. In 30th USENIX Security Symposium (USENIX Security 21), pages 1397--1414, 2021."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_45_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"Mangard Stefan","year":"2007","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag, 2007."},{"key":"e_1_3_2_1_46_1","first-page":"1427","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Moritz Lipp, Berk Sunar, and Michael Schwarz. Medusa: Microarchitectural data leakage via automated attack synthesis. In 29th USENIX Security Symposium (USENIX Security 20), pages 1427--1444, 2020."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527412"},{"key":"e_1_3_2_1_48_1","volume-title":"Serberus: Protecting cryptographic code from spectres at compile-time. arXiv preprint arXiv:2309.05174","author":"Mosier Nicholas","year":"2023","unstructured":"Nicholas Mosier, Hamed Nemati, John C Mitchell, and Caroline Trippel. Serberus: Protecting cryptographic code from spectres at compile-time. arXiv preprint arXiv:2309.05174, 2023."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507729"},{"key":"e_1_3_2_1_50_1","volume-title":"Hide and seek with spectres: Efficient discovery of speculative information leaks with random testing. arXiv preprint arXiv:2301.07642","author":"Oleksenko Oleksii","year":"2023","unstructured":"Oleksii Oleksenko, Marco Guarnieri, Boris K\u00f6pf, and Mark Silberstein. Hide and seek with spectres: Efficient discovery of speculative information leaks with random testing. arXiv preprint arXiv:2301.07642, 2023."},{"key":"e_1_3_2_1_51_1","first-page":"42","volume-title":"Computer Aided Verification: 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part II 28","author":"Reid Alastair","year":"2016","unstructured":"Alastair Reid, Rick Chen, Anastasios Deligiannis, David Gilday, David Hoyes, Will Keen, Ashan Pathirane, Owen Shepherd, Peter Vrabel, and Ali Zaidi. End-to-end verification of processors with isa-formal. In Computer Aided Verification: 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part II 28, pages 42--58. Springer, 2016."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_2_1_53_1","first-page":"1","volume-title":"MBMV 2023; 26th Workshop","author":"Schmitz Philipp","year":"2023","unstructured":"Philipp Schmitz, Johannes Mueller, Christian Bartsch, Dominik Stoffel, and Wolfgang Kunz. Upec-pn: Exhaustive constant time verification of low-level software using property checking. In MBMV 2023; 26th Workshop, pages 1--8. VDE, 2023."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_55_1","first-page":"2549","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Solt Flavien","year":"2022","unstructured":"Flavien Solt, Ben Gras, and Kaveh Razavi. CellIFT: Leveraging cells for scalable and precise dynamic information flow tracking in RTL. In 31st USENIX Security Symposium (USENIX Security 22), pages 2549--2566, 2022."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616643"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833802"},{"key":"e_1_3_2_1_59_1","unstructured":"Alex Wezel Tobias Jauch. UPEC Verification Suite. https:\/\/github.com\/ RPTU-EIS\/SecureBOOM. [Accessed 12-07-2024]."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00081"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484810"},{"key":"e_1_3_2_1_62_1","first-page":"991","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the intel SGX kingdom with transient Out-of-Order execution. In 27th USENIX Security Symposium (USENIX Security 18), pages 991--1008, 2018."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_65_1","volume-title":"2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE","author":"Sanchez Vicarte Jose Rodrigo","year":"2021","unstructured":"Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, and Christopher W Fletcher. Opening pandora's box: A systematic study of new ways microarchitecture can leak private data. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2021."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2953709"},{"key":"e_1_3_2_1_67_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, ChristopherW. Fletcher, and David Kohlbrenner. Hertzbleed: Turning power Side-Channel attacks into remote timing attacks on x86. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, 2022."},{"key":"e_1_3_2_1_68_1","volume-title":"Open-sourced framework of \"specification and verification of side-channel security for open-source processors via leakage contracts\". https:\/\/github.com\/zilongwang123\/LeaVe","author":"Wang Zilong","year":"2023","unstructured":"Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, and Marco Guarnieri. Open-sourced framework of \"specification and verification of side-channel security for open-source processors via leakage contracts\". https:\/\/github.com\/zilongwang123\/LeaVe, 2023. Accessed 15 January 2024."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623192"},{"key":"e_1_3_2_1_70_1","first-page":"1415","volume-title":"30th USENIX Security Symposium (USENIX Security","author":"Weber Daniel","year":"2021","unstructured":"Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, and Christian Rossow. Osiris: Automated discovery of microarchitectural side channels. In 30th USENIX Security Symposium (USENIX Security , pages 1415--1432, 2021."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314647"},{"key":"e_1_3_2_1_73_1","volume-title":"Speechminer: A framework for investigating and measuring speculative execution vulnerabilities. arXiv preprint arXiv:1912.00329","author":"Xiao Yuan","year":"2019","unstructured":"Yuan Xiao, Yinqian Zhang, and Radu Teodorescu. Speechminer: A framework for investigating and measuring speculative execution vulnerabilities. arXiv preprint arXiv:1912.00329, 2019."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712564"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589094"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623074"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694372"},{"key":"e_1_3_2_1_80_1","volume-title":"Sonicboom: The 3rd generation berkeley out-of-order machine","author":"Zhao Jerry","year":"2020","unstructured":"Jerry Zhao, Ben Korpan, Abraham Gonzalez, and Krste Asanovic. Sonicboom: The 3rd generation berkeley out-of-order machine. May 2020."}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707243","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:50:34Z","timestamp":1755787834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":80,"alternative-id":["10.1145\/3669940.3707243","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707243","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}