{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:09:07Z","timestamp":1725620947530},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116402","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T19:28:37Z","timestamp":1592249317000},"page":"927-932","source":"Crossref","is-referenced-by-count":1,"title":["GhostBusters: Mitigating Spectre Attacks on a DBT-Based Processor"],"prefix":"10.23919","author":[{"given":"Simon","family":"Rokicki","sequence":"first","affiliation":[{"name":"Univ Rennes,INRIA, CNRS, IRISA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1998.694777"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715010"},{"article-title":"Oo7: Low-overhead Defense against Spectre Attacks via Binary Analysis","year":"2018","author":"wang","key":"ref12"},{"article-title":"Spectre is here to stay: An analysis of side-channels and speculative execution","year":"2019","author":"mcilroy","key":"ref13"},{"article-title":"SPECTECTOR: Principled Detection of Speculative Information Flows","year":"2018","author":"guarnieri","key":"ref14"},{"article-title":"Spectre Attacks: Exploiting Speculative Execution","year":"2018","author":"kocher","key":"ref4"},{"key":"ref3","article-title":"Hybrid-DBT: Hardware\/Software Dynamic Binary Translation Targeting VLIW","author":"rokicki","year":"2018","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"article-title":"Speculative Buffer Overflows: Attacks and Defenses","year":"2018","author":"kiriansky","key":"ref6"},{"article-title":"SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks","year":"2019","author":"islam","key":"ref5"},{"key":"ref8","first-page":"241","article-title":"Discerning the Dominant Out-of-order Performance Advantage: Is It Speculation or Dynamism?","author":"mcfarlin","year":"2013","journal-title":"Proceedings of the eighth international conference on Architectural support for programming languages and operating systems - AS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191529"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195534"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116402.pdf?arnumber=9116402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:47:40Z","timestamp":1659469660000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116402","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}