{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:40:08Z","timestamp":1750506008582,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2053383"],"award-info":[{"award-number":["CNS-2053383"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,21]]},"DOI":"10.1145\/3695053.3731119","type":"proceedings-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T16:43:11Z","timestamp":1750437791000},"page":"2032-2045","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SpecASan: Mitigating Transient Execution Attacks Using Speculative Address Sanitization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9463-3090","authenticated-orcid":false,"given":"Saber","family":"Ganjisaffar","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6584-9086","authenticated-orcid":false,"given":"Esmaeil Mohmmadian","family":"Koruyeh","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5365-9050","authenticated-orcid":false,"given":"Jason","family":"Zellmer","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7200-6757","authenticated-orcid":false,"given":"Hodjat Asghari","family":"Esfeden","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-3068","authenticated-orcid":false,"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9485-5370","authenticated-orcid":false,"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2013. ARM\u00ae Architecture Reference Manual ARMv8."},{"key":"e_1_3_3_1_3_2","unstructured":"2017. SPEC. Standard Performance Evaluation Corporation SPEC CPU 2017.spec:org\/cpu2017\/"},{"key":"e_1_3_3_1_4_2","unstructured":"2019. Arm. Limited. Armv8.5-A Memory Tagging Extension White Paper. https:\/\/developer.arm.com\/documentation\/102925\/latest\/"},{"key":"e_1_3_3_1_5_2","unstructured":"2019. Arm. Limited. Speculative oracles on memory tagging. https:\/\/developer.arm.com\/documentation\/109544\/0100"},{"key":"e_1_3_3_1_6_2","unstructured":"2019. Intel Corporation. Control-flow enforcement technology preview. https:\/\/kib.kiev.ua\/x86docs\/Intel\/CET\/334525-003.pdf."},{"key":"e_1_3_3_1_7_2","unstructured":"2019. MemTagSanitizer \u2014 LLVM 19.0.0. https:\/\/llvm.org\/docs\/MemTagSanitizer.html"},{"key":"e_1_3_3_1_8_2","unstructured":"2020. Scudo Hardened Allocator. https:\/\/llvm.org\/docs\/ScudoHardenedAllocator.html"},{"key":"e_1_3_3_1_9_2","unstructured":"2021. ARM Limited. Arm\u00ae a64 instruction set architecture. https:\/\/developer.arm.com\/documentation\/ddi0596\/2021-12."},{"key":"e_1_3_3_1_10_2","unstructured":"2024. Chromium Partition Allocator. https:\/\/source.chromium.org\/chromium\/chromium\/src\/+\/main:base\/allocator\/partition_allocator\/src\/partition_alloc\/partition_bucket.cc?q=TagMemoryRangeRandomly&start=21"},{"key":"e_1_3_3_1_11_2","unstructured":"2024. Linux Tag-based Kernel Address Sanitizer (KASAN). https:\/\/docs.kernel.org\/dev-tools\/kasan.html"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480074"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2019.00020"},{"key":"e_1_3_3_1_15_2","first-page":"971","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Barberis Enrico","year":"2022","unstructured":"Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida. 2022. Branch History Injection: On the Effectiveness of Hardware Mitigations Against { Cross-Privilege} Spectre-v2 Attacks. In 31st USENIX Security Symposium (USENIX Security 22). 971\u2013988."},{"key":"e_1_3_3_1_16_2","first-page":"971","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Barberis Enrico","year":"2022","unstructured":"Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida. 2022. Branch history injection: On the effectiveness of hardware mitigations against { Cross-Privilege} spectre-v2 attacks. In 31st USENIX Security Symposium (USENIX Security 22). 971\u2013988."},{"key":"e_1_3_3_1_17_2","volume-title":"Proceedings of the 2024 ACM Asia Conference on Computer and Communications Security","author":"Bauer Markus","year":"2024","unstructured":"Markus Bauer, Lorenz Hetterich, Christian Rossow, and Michael Schwarz. 2024. Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8. In Proceedings of the 2024 ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_3_1_23_2","first-page":"249","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo Van\u00a0Bulck, Michael Schwarz, Moritz Lipp, Benjamin Von\u00a0Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A systematic evaluation of transient execution attacks and defenses. In 28th USENIX Security Symposium (USENIX Security 19). 249\u2013266."},{"key":"e_1_3_3_1_24_2","unstructured":"Chandler Carruth. 2018. RFC: Speculative Load Hardening (a Spectre variant1 mitigation). https:\/\/lists.llvm.org\/pipermail\/llvm-dev\/2018-March\/122085.html."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480068"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Dinakar Dhurjati Sumant Kowshik and Vikram Adve. 2006. SAFECode: Enforcing alias analysis for weakly typed languages. ACM SIGPLAN Notices 41 6 (2006) 144\u2013157.","DOI":"10.1145\/1133255.1133999"},{"key":"e_1_3_3_1_29_2","unstructured":"Vincenzo Frascino and Catalin Marinas. 2020. Memory Tagging Extension (MTE) in AArch64 Linux. https:\/\/docs.kernel.org\/arch\/arm64\/memory-tagging-extension.html"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421216"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317914"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Daniel Genkin Itamar Pipman and Eran Tromer. 2015. Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version. Journal of Cryptographic Engineering 5 (2015) 95\u2013112.","DOI":"10.1007\/s13389-015-0100-7"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417289"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00263"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_3_1_36_2","unstructured":"John Horn. 2018. speculative execution variant 4: speculative store bypass."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00023"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Hai Jin Zhuo He and Weizhong Qiang. 2023. SpecTerminator: Blocking speculative side channels based on instruction classes on RISC-V. ACM Transactions on Architecture and Code Optimization 20 1 (2023) 1\u201326.","DOI":"10.1145\/3566053"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317903"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690184"},{"key":"e_1_3_3_1_41_2","unstructured":"Juhee Kim Jinbum Park Sihyeon Roh Jaeyoung Chung Youngjoo Lee Taesoo Kim and Byoungyoung Lee. 2024. TikTag: Breaking ARM\u2019s Memory Tagging Extension with Speculative Execution. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.08719 (2024)."},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"e_1_3_3_1_43_2","unstructured":"Vladimir Kiriansky and Carl Waldspurger. 2018. Speculative buffer overflows: Attacks and defenses. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1807.03757 (2018)."},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Paul Kocher Jann Horn Anders Fogh Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher et\u00a0al. 2020. Spectre attacks: Exploiting speculative execution. Commun. ACM 63 7 (2020) 93\u2013101.","DOI":"10.1145\/3399742"},{"key":"e_1_3_3_1_45_2","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Koruyeh Esmaeil\u00a0Mohammadian","year":"2018","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh, Khaled\u00a0N Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. Spectre returns! speculation attacks using the return stack buffer. In 12th USENIX Workshop on Offensive Technologies (WOOT 18)."},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00033"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105405"},{"key":"e_1_3_3_1_49_2","unstructured":"Hans Liljestrand Carlos Chinea R\u00e9mi Denis-Courmont Jan-Erik Ekberg and N Asokan. 2022. Color My World: Deterministic Tagging for Memory Safety. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.03781 (2022)."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Moritz Lipp Michael Schwarz Daniel Gruss Thomas Prescher Werner Haas Jann Horn Stefan Mangard Paul Kocher Daniel Genkin Yuval Yarom et\u00a0al. 2020. Meltdown: Reading kernel memory from user space. Commun. ACM 63 6 (2020) 46\u201356.","DOI":"10.1145\/3357033"},{"key":"e_1_3_3_1_51_2","first-page":"1397","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021. { DOLMA} : Securing speculation with the principle of transient { Non-Observability}. In 30th USENIX Security Symposium (USENIX Security 21). 1397\u20131414."},{"key":"e_1_3_3_1_52_2","unstructured":"Jason Lowe-Power Abdul\u00a0Mutaal Ahmad Ayaz Akram Mohammad Alian Rico Amslinger Matteo Andreozzi Adri\u00e0 Armejach Nils Asmussen Brad Beckmann Srikant Bharadwaj et\u00a0al. 2020. The gem5 simulator: Version 20.0+. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2007.03152 (2020)."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_3_1_54_2","unstructured":"Brand Mark. 2023. First handset with MTE on the market. https:\/\/googleprojectzero.blogspot.com\/2023\/11\/first-handsetwith-mte-on-market.html"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00017"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00017"},{"key":"e_1_3_3_1_58_2","unstructured":"Oleksii Oleksenko Bohdan Trach Tobias Reiher Mark Silberstein and Christof Fetzer. 2018. You shall not bypass: Employing data dependencies to prevent bounds check bypass. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1805.08506 (2018)."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00019"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_3_1_61_2","unstructured":"Aditi Partap and Dan Boneh. 2022. Memory Tagging: A Memory Efficient Design. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2209.00307 (2022)."},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323979"},{"key":"e_1_3_3_1_63_2","unstructured":"Andy Qin Irene Ang Kostya Serebryany and Evgenii Stepanov. 2023. MTE - The promising path forward for memory safety. https:\/\/security.googleblog.com\/2023\/11\/mte-promising-path-forward-for-memory.html"},{"key":"e_1_3_3_1_64_2","unstructured":"Allison Randal. 2023. This is how you lose the transient execution war. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.03376 (2023)."},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358314"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3321558"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24271"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Jiwon Seo Junseung You Donghyun Kwon Yeongpil Cho and Yunheung Paek. 2023. ZOMETAG: Zone-based memory tagging for fast deterministic detection of spatial memory violations on ARM. IEEE Transactions on Information Forensics and Security (2023).","DOI":"10.1109\/TIFS.2023.3299454"},{"key":"e_1_3_3_1_72_2","unstructured":"Kostya Serebryany. 2019. ARM memory tagging extension and how it improves C\/C++ memory safety. The Usenix Magazine 44 2 (2019) 12\u201316."},{"key":"e_1_3_3_1_73_2","volume-title":"USENIX ATC 2012","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX ATC 2012. https:\/\/www.usenix.org\/conference\/usenixfederatedconferencesweek\/addresssanitizer-fast-address-sanity-checker"},{"key":"e_1_3_3_1_74_2","unstructured":"Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C++ memory safety. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.09517 (2018)."},{"key":"e_1_3_3_1_75_2","unstructured":"Julian Stecklina and Thomas Prescher. 2018. Lazyfp: Leaking fpu register state using microarchitectural side-channels. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1806.07480 (2018)."},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304060"},{"key":"e_1_3_3_1_77_2","first-page":"7303","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Trujillo Dani\u00ebl","year":"2023","unstructured":"Dani\u00ebl Trujillo, Johannes Wikner, and Kaveh Razavi. 2023. Inception: Exposing new attack surfaces with training in transient execution. In 32nd USENIX Security Symposium (USENIX Security 23). 7303\u20137320."},{"key":"e_1_3_3_1_78_2","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection."},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3590331"},{"key":"e_1_3_3_1_80_2","first-page":"991","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Van\u00a0Bulck Jo","year":"2018","unstructured":"Jo Van\u00a0Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel { SGX} kingdom with transient { Out-of-Order} execution. In 27th USENIX Security Symposium (USENIX Security 18). 991\u20131008."},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_3_1_83_2","unstructured":"Ofir Weisse Jo Van\u00a0Bulck Marina Minkin Daniel Genkin Baris Kasikci Frank Piessens Mark Silberstein Raoul Strackx Thomas\u00a0F Wenisch and Yuval Yarom. 2018. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution. (2018)."},{"key":"e_1_3_3_1_84_2","volume-title":"USENIX Security","author":"Wiebing Sander","year":"2024","unstructured":"Sander Wiebing, Alvise de Faveri\u00a0Tron, Herbert Bos, and Cristiano Giuffrida. 2024. InSpectre Gadget: Inspecting the residual attack surface of cross-privilege Spectre v2. In USENIX Security."},{"key":"e_1_3_3_1_85_2","first-page":"3825","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wikner Johannes","year":"2022","unstructured":"Johannes Wikner and Kaveh Razavi. 2022. { RETBLEED} : Arbitrary speculative code execution with return instructions. In 31st USENIX Security Symposium (USENIX Security 22). 3825\u20133842."},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"e_1_3_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589094"},{"key":"e_1_3_3_1_88_2","first-page":"719","volume-title":"23rd USENIX security symposium (USENIX security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. { FLUSH+ RELOAD} : A high resolution, low noise, l3 cache { Side-Channel} attack. In 23rd USENIX security symposium (USENIX security 14). 719\u2013732."},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00064"},{"key":"e_1_3_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"e_1_3_3_1_91_2","first-page":"7125","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhang Zhiyuan","year":"2023","unstructured":"Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, and Yuval Yarom. 2023. Ultimate { SLH} : Taking Speculative Load Hardening to the Next Level. In 32nd USENIX Security Symposium (USENIX Security 23). 7125\u20137142."}],"event":{"name":"ISCA '25: Proceedings of the 52nd Annual International Symposium on Computer Architecture","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Tokyo Japan","acronym":"SIGARCH '25"},"container-title":["Proceedings of the 52nd Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3731119","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3731119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:10:10Z","timestamp":1750504210000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695053.3731119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":90,"alternative-id":["10.1145\/3695053.3731119","10.1145\/3695053"],"URL":"https:\/\/doi.org\/10.1145\/3695053.3731119","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}