{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T08:11:19Z","timestamp":1767859879217,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122023,U20A20202,61874042"],"award-info":[{"award-number":["62122023,U20A20202,61874042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.23919\/date56975.2023.10137180","type":"proceedings-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T19:32:57Z","timestamp":1685734377000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Spoiler-Alert: Detecting Spoiler Attacks Using a Cuckoo Filter"],"prefix":"10.23919","author":[{"given":"Jinhua","family":"Cui","sequence":"first","affiliation":[{"name":"Hunan University,Changsha,China"}]},{"given":"Yiyun","family":"Yin","sequence":"additional","affiliation":[{"name":"Hunan University,Changsha,China"}]},{"given":"Congcong","family":"Chen","sequence":"additional","affiliation":[{"name":"Hunan University,Changsha,China"}]},{"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hunan University,Changsha,China"}]}],"member":"263","reference":[{"key":"ref13","author":"horn","year":"2018","journal-title":"Speculative execution variant 4 speculative store by-pass"},{"key":"ref12","first-page":"98:1","article-title":"Cache side-channel attacks and time-predictability in high-performance critical real-time systems","author":"trilla","year":"2018","journal-title":"DAC"},{"key":"ref15","first-page":"572","article-title":"NDA: preventing speculative execution attacks at their source","author":"weisse","year":"2019","journal-title":"Micro"},{"key":"ref14","author":"culbertson","year":"2018","journal-title":"Addressing new research for side-channel analysis"},{"key":"ref20","first-page":"544","article-title":"Microarchitectural transient execution attacks and defense methods","volume":"31","author":"xiao-hui","year":"2020","journal-title":"Journal of Software"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317914"},{"key":"ref22","first-page":"21","article-title":"Spectaint: Speculative taint analysis for discovering spectre gadgets","author":"q","year":"2021","journal-title":"NDSS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00022"},{"key":"ref21","first-page":"57","article-title":"Cyclone: Detecting contention-based cache information leaks through cyclic interference","author":"harris","year":"2019","journal-title":"Micro"},{"key":"ref2","article-title":"Speculative buffer overflows: Attacks and defenses","volume":"abs 1807 3757","author":"kiriansky","year":"2018","journal-title":"CoRR"},{"key":"ref1","first-page":"1","article-title":"Spectre attacks: Exploiting speculative execution","author":"k","year":"2019","journal-title":"IEEE S&P"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref19","author":"i","year":"2019","journal-title":"Spoiler"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2024716.2024718","article-title":"The gem5 simulator","volume":"39","author":"b","year":"2011","journal-title":"SIGArch Computer Architecture News"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317903"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00033"},{"key":"ref9","first-page":"428","article-title":"Invisispec: Making speculative execution invisible in the cache hierarchy","author":"yan","year":"2018","journal-title":"Micro"},{"key":"ref4","first-page":"361","article-title":"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors","volume":"42","author":"k","year":"2014","journal-title":"ISCA"},{"key":"ref3","first-page":"621","article-title":"SPOILER: speculative load hazards boost rowhammer and cache attacks","author":"i","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref6","first-page":"1481","article-title":"Specfuzz: Bringing spectre-type vulnerabilities to the surface","author":"oleksenko","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2953709"}],"event":{"name":"2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Antwerp, Belgium","start":{"date-parts":[[2023,4,17]]},"end":{"date-parts":[[2023,4,19]]}},"container-title":["2023 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10136870\/10136706\/10137180.pdf?arnumber=10137180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:01:11Z","timestamp":1702321271000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10137180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/date56975.2023.10137180","relation":{},"subject":[],"published":{"date-parts":[[2023,4]]}}}