{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:05:30Z","timestamp":1730275530763,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/ispa-bdcloud-socialcom-sustaincom51426.2020.00071","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T16:42:20Z","timestamp":1622824940000},"page":"363-370","source":"Crossref","is-referenced-by-count":0,"title":["Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks"],"prefix":"10.1109","author":[{"given":"Yaosong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"719","article-title":"Flush+ reload: a high resolution, low noise, 13 cache side-channel attack","author":"yarom","year":"0","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref32","first-page":"1805","article-title":"Evaluating compatibility and relevance of control-flow integrity protections for modern software","author":"xu","year":"0","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3330345.3330389"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref10","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","author":"gruss","year":"0","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2014.10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref16","first-page":"1769","article-title":"Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences","author":"lu","year":"0","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_2"},{"key":"ref18","first-page":"105","article-title":"Read it twice! a mass-storage-based tocttou attack","author":"mulliner","year":"2012","journal-title":"WOOT"},{"key":"ref19","first-page":"227","article-title":"Varys: Protecting {SGX} enclaves from practical side-channel attacks","author":"oleksenko","year":"0","journal-title":"2018 USENIX Annual Technical Conference ( USENIX ATC 18)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.67"},{"key":"ref3","first-page":"129","article-title":"An intrusion response taxonomy and its role in automatic intrusion response","author":"carver","year":"2000","journal-title":"Proceedings of the 2000 IEEE Workshop on Information Assurance and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"ref29","first-page":"451","article-title":"Attacking the brain: Races in the {SDN} control plane","author":"xu","year":"0","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"journal-title":"Understanding the Linux Virtual Memory Manager","year":"2004","author":"gorman","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6286-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339809"},{"volume":"1 2a 2b 2c 3a 3b 3c and 3d","journal-title":"Intel 64 and IA-32 architectures software developer's manual","year":"2019","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196508"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007794"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243844"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6383-8"}],"event":{"name":"2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","start":{"date-parts":[[2020,12,17]]},"location":"Exeter, United Kingdom","end":{"date-parts":[[2020,12,19]]}},"container-title":["2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9443649\/9443670\/09443979.pdf?arnumber=9443979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:49:58Z","timestamp":1656438598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9443979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ispa-bdcloud-socialcom-sustaincom51426.2020.00071","relation":{},"subject":[],"published":{"date-parts":[[2020,12]]}}}