{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:47:00Z","timestamp":1772725620866,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3733869","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"1203-1218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5342-3847","authenticated-orcid":false,"given":"Philipp","family":"Schmitz","sequence":"first","affiliation":[{"name":"RPTU Kaiserslautern-Landau, Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6547-1544","authenticated-orcid":false,"given":"Tobias","family":"Jauch","sequence":"additional","affiliation":[{"name":"RPTU Kaiserslautern-Landau, Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3462-0094","authenticated-orcid":false,"given":"Alex","family":"Wezel","sequence":"additional","affiliation":[{"name":"RPTU Kaiserslautern-Landau, Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0214-2486","authenticated-orcid":false,"given":"Mohammad Rahmani","family":"Fadiheh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9018-4226","authenticated-orcid":false,"given":"Thore","family":"Tiemann","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9987-2403","authenticated-orcid":false,"given":"Jonah","family":"Heller","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1116-6973","authenticated-orcid":false,"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8180-9738","authenticated-orcid":false,"given":"Dominik","family":"Stoffel","sequence":"additional","affiliation":[{"name":"RPTU Kaiserslautern-Landau, Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6612-2946","authenticated-orcid":false,"given":"Wolfgang","family":"Kunz","sequence":"additional","affiliation":[{"name":"RPTU Kaiserslautern-Landau, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Speculation Behaviour in AMD Micro-Architectures","year":"2019","unstructured":"AMD. 2019. Speculation Behaviour in AMD Micro-Architectures. Technical Report Revision 5.14.19. AMD. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/resources\/bulletin\/1924930.pdf"},{"key":"e_1_3_3_2_3_2","volume-title":"Security Analysis of AMD Predictive Store Forwarding","year":"2023","unstructured":"AMD. 2023. Security Analysis of AMD Predictive Store Forwarding. Technical Report. AMD. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/processor-tech-docs\/white-papers\/security-analysis-of-amd-predictive-store-forwarding.pdf"},{"key":"e_1_3_3_2_4_2","first-page":"285","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Renton, WA, USA, July 10-12, 2019","author":"Amit Nadav","year":"2019","unstructured":"Nadav Amit, Fred Jacobs, and Michael Wei. 2019. JumpSwitches: Restoring the Performance of Indirect Branches In the Era of Spectre. In Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Renton, WA, USA, July 10-12, 2019, Dahlia Malkhi and Dan Tsafrir (Eds.). USENIX Association, 285\u2013300. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/amit"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446708"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.2200\/S00795ED1V01Y201708CAC042"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Nathan\u00a0L. Binkert Bradford\u00a0M. Beckmann Gabriel Black Steven\u00a0K. Reinhardt Ali\u00a0G. Saidi Arkaprava Basu Joel Hestness Derek Hower Tushar Krishna Somayeh Sardashti Rathijit Sen Korey Sewell Muhammad Shoaib\u00a0Bin Altaf Nilay Vaish Mark\u00a0D. Hill and David\u00a0A. Wood. 2011. The gem5 simulator. SIGARCH Comput. Archit. News 39 2 (2011) 1\u20137. 10.1145\/2024716.2024718","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_3_2_11_2","unstructured":"Bytecode Alliance. 2017. wasmtime: A standalone Runtime for WebAssembly. https:\/\/github.com\/bytecodealliance\/wasmtime Accessed: 2025-04-28."},{"key":"e_1_3_3_2_12_2","unstructured":"Bytecode Alliance. 2019. sightglass: A benchmarking suite and tooling for Wasmtime and Cranelift. https:\/\/github.com\/bytecodealliance\/sightglass Accessed: 2025-04-28."},{"key":"e_1_3_3_2_13_2","first-page":"249","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo\u00a0Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 249\u2013266. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/canella"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Sunjay Cauligi Marco Guarnieri Daniel Moghimi Deian Stefan and Marco Vassena. 2022. A Turning Point for Verified Spectre Sandboxing. CoRR abs\/2208.01548 (2022). 10.48550\/ARXIV.2208.01548 arXiv:https:\/\/arXiv.org\/abs\/2208.01548","DOI":"10.48550\/ARXIV.2208.01548"},{"key":"e_1_3_3_2_15_2","unstructured":"Christopher Celio. 2017. A Highly Productive Implementation of an Out-of-Order Processor Generator. Ph.\u00a0D. Dissertation. University of California Berkeley USA. https:\/\/www.escholarship.org\/uc\/item\/5vh084rf"},{"key":"e_1_3_3_2_16_2","first-page":"1117","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","author":"Chen Boru","year":"2024","unstructured":"Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher\u00a0W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, and Daniel Genkin. 2024. GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. In 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association, 1117\u20131134. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/chen-boru"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480068"},{"key":"e_1_3_3_2_18_2","unstructured":"Cloudflare. 2018. Cloudflare Workers documentation: Security Model. https:\/\/developers.cloudflare.com\/workers\/reference\/security-model\/ Accessed: 2024-04-10."},{"key":"e_1_3_3_2_19_2","unstructured":"Cloudflare. 2024. Cloudflare Workers documentation: How Workers works. https:\/\/developers.cloudflare.com\/workers\/reference\/how-workers-works\/ Accessed: 2025-04-28."},{"key":"e_1_3_3_2_20_2","unstructured":"Intel Corporation. 2018. Indirect Branch Prediction Barrier. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-predictor-barrier.html Accessed: 2025-04-28."},{"key":"e_1_3_3_2_21_2","unstructured":"Intel Corporation. 2018. Indirect Branch Restricted Speculation. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-restricted-speculation.html Accessed: 2025-04-28."},{"key":"e_1_3_3_2_22_2","unstructured":"Intel Corporation. 2018. Single Thread Indirect Branch Predictors. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/single-thread-indirect-branch-predictors.html Accessed: 2025-04-28."},{"key":"e_1_3_3_2_23_2","unstructured":"Intel Corporation. 2024. Intel 64 and IA-32 Architectures Software Developer Manuals. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html Accessed: 2025-04-28."},{"key":"e_1_3_3_2_24_2","first-page":"7161","volume-title":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","author":"Daniel Lesly-Ann","year":"2023","unstructured":"Lesly-Ann Daniel, Marton Bognar, Job Noorman, S\u00e9bastien Bardin, Tamara Rezk, and Frank Piessens. 2023. ProSpeCT: Provably Secure Speculation for the Constant-Time Policy. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, Joseph\u00a0A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 7161\u20137178. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/daniel"},{"key":"e_1_3_3_2_25_2","unstructured":"Frank Denis. 2023. Libsodium. https:\/\/doc.libsodium.org\/ Accessed: 2025-04-28."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446740"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218572"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Mohammad\u00a0Rahmani Fadiheh Alex Wezel Johannes M\u00fcller J\u00f6rg Bormann Sayak Ray Jason\u00a0M. Fung Subhasish Mitra Dominik Stoffel and Wolfgang Kunz. 2023. An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors. IEEE Trans. Computers 72 1 (2023) 222\u2013235. 10.1109\/TC.2022.3152666","DOI":"10.1109\/TC.2022.3152666"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317914"},{"key":"e_1_3_3_2_30_2","unstructured":"Google. 2019. SafeSide. https:\/\/github.com\/google\/safeside Accessed: 2025-04-28."},{"key":"e_1_3_3_2_31_2","unstructured":"Google for Developers. 2018. Code Sandboxing. https:\/\/developers.google.com\/code-sandboxing Accessed: 2025-04-28."},{"key":"e_1_3_3_2_32_2","unstructured":"Google Security Research. 2020. Finding Gadgets for CPU Side-Channels with Static Analysis Tools. https:\/\/github.com\/google\/security-research\/blob\/master\/pocs\/cpus\/spectre-gadgets\/README.md Accessed: 2025-04-28."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Conor Green Cole Nelson Mithuna Thottethodi and T.\u00a0N. Vijaykumar. 2023. SafeBet: Secure Simple and Fast Speculative Execution. CoRR abs\/2306.07785 (2023). 10.48550\/ARXIV.2306.07785 arXiv:https:\/\/arXiv.org\/abs\/2306.07785","DOI":"10.48550\/ARXIV.2306.07785"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00036"},{"key":"e_1_3_3_2_35_2","unstructured":"Greg Hamerly Erez Perelman Jeremy Lau and Brad Calder. 2005. SimPoint 3.0: Faster and More Flexible Program Phase Analysis. J. Instr. Level Parallelism 7 (2005) 1\u201328. http:\/\/www.jilp.org\/vol7\/v7paper14.pdf"},{"key":"e_1_3_3_2_36_2","unstructured":"Jann Horn. 2018. Speculative execution variant 4: speculative store bypass. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528 Accessed: 2025-04-28."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323843"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA59077.2024.00059"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_3_2_40_2","volume-title":"12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018","author":"Koruyeh Esmaeil\u00a0Mohammadian","year":"2018","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh, Khaled\u00a0N. Khasawneh, Chengyu Song, and Nael\u00a0B. Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In 12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018, Christian Rossow and Yves Younan (Eds.). USENIX Association. https:\/\/www.usenix.org\/conference\/woot18\/presentation\/koruyeh"},{"key":"e_1_3_3_2_41_2","first-page":"2137","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","author":"Li Luyi","year":"2024","unstructured":"Luyi Li, Hosein Yavarzadeh, and Dean\u00a0M. Tullsen. 2024. Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor. In 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association, 2137\u20132154. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/li-luyi"},{"key":"e_1_3_3_2_42_2","unstructured":"LLVM Foundation. 2007. LLVM. http:\/\/llvm.org"},{"key":"e_1_3_3_2_43_2","first-page":"1397","volume-title":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","author":"Loughlin Kevin","year":"2021","unstructured":"Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, and Baris Kasikci. 2021. DOLMA: Securing Speculation with the Principle of Transient Non-Observability. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael\u00a0D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1397\u20131414. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/loughlin"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_3_2_45_2","unstructured":"Ross McIlroy Jaroslav Sevc\u00edk Tobias Tebbi Ben\u00a0L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. CoRR abs\/1902.05178 (2019). arXiv:https:\/\/arXiv.org\/abs\/1902.05178http:\/\/arxiv.org\/abs\/1902.05178"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00048"},{"key":"e_1_3_3_2_47_2","first-page":"1433","volume-title":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","author":"Narayan Shravan","year":"2021","unstructured":"Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean\u00a0M. Tullsen, and Deian Stefan. 2021. Swivel: Hardening WebAssembly against Spectre. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael\u00a0D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1433\u20131450. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/narayan"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582023"},{"key":"e_1_3_3_2_49_2","unstructured":"New York Times. 2019. The Loophole That Turns Your Apps Into Spies. https:\/\/www.nytimes.com\/2019\/09\/24\/opinion\/facebook-google-apps-data.html Accessed: 2025-04-28."},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_3_2_51_2","first-page":"1677","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Schrammel David","year":"2020","unstructured":"David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1677\u20131694. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/schrammel"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24271"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17146-8_9"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/2655363"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Bowen Tang Chenggang Wu Zhe Wang Lichen Jia Pen-Chung Yew Yueqiang Cheng Yinqian Zhang Chenxi Wang and Guoqing\u00a0Harry Xu. 2023. SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20 1 (2023) 827\u2013840. 10.1109\/TDSC.2022.3144287","DOI":"10.1109\/TDSC.2022.3144287"},{"key":"e_1_3_3_2_57_2","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886 Accessed: 2025-04-28."},{"key":"e_1_3_3_2_58_2","first-page":"1221","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno\u00a0O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 1221\u20131238. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833570"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_3_2_62_2","first-page":"577","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","author":"Wiebing Sander","year":"2024","unstructured":"Sander Wiebing, Alvise de Faveri\u00a0Tron, Herbert Bos, and Cristiano Giuffrida. 2024. InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2. In 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association, 577\u2013594. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/wiebing"},{"key":"e_1_3_3_2_63_2","first-page":"3825","volume-title":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022","author":"Wikner Johannes","year":"2022","unstructured":"Johannes Wikner and Kaveh Razavi. 2022. RETBLEED: Arbitrary Speculative Code Execution with Return Instructions. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, Kevin R.\u00a0B. Butler and Kurt Thomas (Eds.). USENIX Association, 3825\u20133842. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wikner"},{"key":"e_1_3_3_2_64_2","first-page":"719","volume-title":"Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 719\u2013732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620666.3651382"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00064"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358274"},{"key":"e_1_3_3_2_68_2","volume-title":"Fourth Workshop on Computer Architecture Research with RISC-V (CARRV 2020)","author":"Zhao Jerry","year":"2020","unstructured":"Jerry Zhao, Ben Korpan, Abraham Gonzalez, and Krste Asanovic. 2020. SonicBOOM: The 3rd Generation Berkeley Out-of-Order Machine. In Fourth Workshop on Computer Architecture Research with RISC-V (CARRV 2020). https:\/\/carrv.github.io\/2020\/papers\/CARRV2020_paper_15_Zhao.pdf"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3733869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:31:53Z","timestamp":1755070313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3733869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":67,"alternative-id":["10.1145\/3708821.3733869","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3733869","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}