{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:30Z","timestamp":1761324150870,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342179","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:20:11Z","timestamp":1524525611000},"page":"1123-1128","source":"Crossref","is-referenced-by-count":3,"title":["\u00d8zone: Efficient execution with zero timing leakage for modern microarchitectures"],"prefix":"10.23919","author":[{"given":"Zelalem Birhanu","family":"Aweke","sequence":"first","affiliation":[]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intel Intel 64 and IA-32 Architectures software's Developer's Manual Volume 3A 3B and 3C System Programming Guide","year":"2015","key":"ref10"},{"key":"ref11","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '96"},{"key":"ref12","first-page":"59","article-title":"Exploiting Hardware Performance Counters","author":"georges","year":"2008","journal-title":"Fault Diagnosis and Tolerance in Cryptography 2008 FDTC'08 5th Workshop on"},{"key":"ref13","article-title":"LLYM: A Compilation Framework for Lifelong Program Analysis & Transformation","author":"lattner","year":"2004","journal-title":"Proceedings of the 2004 International Symposium on Code Generation and Optimization (CGO'04)"},{"key":"ref14","article-title":"Timing Attack in Google Keyczar library","author":"lawson","year":"2009","journal-title":"rdist Blog"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694385"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_14"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2024716.2024718","article-title":"The Gem5 Simulator","volume":"39","author":"binkert","year":"2011","journal-title":"SIGARCH Comput Archit News"},{"journal-title":"Cache-timing attacks on AES","year":"2005","author":"bernstein","key":"ref3"},{"journal-title":"Robust and Efficient Elimination of Cache and Timing Side Channels","year":"2015","author":"braun","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"journal-title":"GDK 3 Reference Manual","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_16"},{"key":"ref9","first-page":"897","article-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches","author":"gruss","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","article-title":"On the Power of Simple Branch Prediction Analysis","author":"acii\u00e7mez","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security ASIACCS '07"},{"key":"ref20","first-page":"1","article-title":"Cache Attacks and Countermeasures: The Case of AES","author":"arne osvik","year":"2006","journal-title":"Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology CT-RSA'06"},{"year":"0","key":"ref22"},{"key":"ref21","first-page":"431","article-title":"Raccoon: Closing Digital Side-channels Through Obfuscated Execution","author":"rane","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_17"},{"key":"ref25","first-page":"719","article-title":"FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack","author":"yarom","year":"2014","journal-title":"Proceedings of the 23rd USENIX Conference on Security Symposium SEC'14"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342179.pdf?arnumber=8342179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T19:48:39Z","timestamp":1661024919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342179","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}