{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:57:57Z","timestamp":1729666677014,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/sp40000.2020.00007","type":"proceedings-article","created":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T00:48:34Z","timestamp":1596156514000},"page":"1207-1222","source":"Crossref","is-referenced-by-count":13,"title":["JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation"],"prefix":"10.1109","author":[{"given":"Tegan","family":"Brennan","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Rosner","sequence":"additional","affiliation":[]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/3213846.3213867","article-title":"Symbolic path cost analysis for side-channel detection","author":"brennan","year":"2018","journal-title":"Proc of ACM SIGSOFT international symposium on Software testing and analysis"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134058"},{"journal-title":"JEP 295 Ahead-of-Time Compilation","year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23264"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086702"},{"article-title":"Decomposition instead of self-composition for k-safety","year":"2017","author":"antopoulos","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSITechnol.2015.7358262"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ESTIMedia.2015.7351768"},{"journal-title":"Ahead-of-time Compilation","year":"0","key":"ref34"},{"key":"ref28","article-title":"Adaptive compiler strategies for mitigating timing side channel attacks","author":"van cleemput","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref27","article-title":"A note on side channels resulting from dynamic compilation","author":"page","year":"2006","journal-title":"Cryptology ePrint Archive"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"ref1","first-page":"76","article-title":"Tempest: A signal problem","volume":"35","author":"friedman","year":"1972","journal-title":"NSA Cryptologic Spectrum"},{"journal-title":"Technical White Paper Sun Microsystems Tech Rep","article-title":"The Java HotSpot Virtual Machine","year":"2006","key":"ref20"},{"journal-title":"Java HotSpot compilation policy and thresholds","year":"0","key":"ref22"},{"journal-title":"TurboFan an optimizing JIT compiler for the V8 JavaScript engine","year":"0","key":"ref21"},{"journal-title":"V8 source code (Google Git repository) tag b6cb","year":"0","key":"ref24"},{"journal-title":"OpenJDK JDK 8 source code (Mercurial repository) tag b132","year":"0","key":"ref23"},{"journal-title":"OpenStreetMap","year":"0","key":"ref26"},{"journal-title":"The JITWatch tool","year":"0","key":"ref25"},{"key":"ref50","first-page":"225","article-title":"Predicting secret keys via branch prediction","author":"ac?i\u00e7mez","year":"2007","journal-title":"The Cryptographers Track at the RSA Conference"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","article-title":"On the power of simple branch prediction analysis","author":"acii\u00e7mez","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security"},{"journal-title":"The Java HotSpot Virtual Machine at a glance","year":"0","key":"ref56"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1145\/3173162.3173204","article-title":"Branch scope: A new side-channel attack on directional branch predictor","author":"evtyushkin","year":"2018","journal-title":"Proceedings of the third international conference on Architectural support for programming languages and operating systems - ASP"},{"key":"ref54","first-page":"16","article-title":"Inferring fine-grained control flow inside sgx enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-540-77272-9_12","article-title":"New branch prediction vulnerabilities in openssl and necessary software countermeasures","author":"ac?i\u00e7mez","year":"2007","journal-title":"6th IMA International Conference on Cryptography and Coding"},{"journal-title":"Apache Shiro","year":"0","key":"ref10"},{"journal-title":"GraphHopper","year":"0","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380010203"},{"journal-title":"Java 7 HotSpot Virtual Machine Performance Enhancements","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/367177.367199"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/800017.800542"},{"key":"ref17","article-title":"Adaptive systems for the dynamic run-time optimization of programs","author":"hansen","year":"1974","journal-title":"Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2172\/4169175"},{"journal-title":"PHP 8 will include a JIT compiler","year":"0","author":"watkins","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"journal-title":"Xbox 360 timing attack","year":"2007","key":"ref6"},{"journal-title":"Timing attack in Google Keyczar library","year":"2009","author":"lawson","key":"ref5"},{"article-title":"Spectre attacks: Exploiting speculative execution","year":"2018","author":"kocher","key":"ref8"},{"journal-title":"Oauth protocol hmac byte value calculation timing disclosure weakness","year":"2013","key":"ref7"},{"key":"ref49","first-page":"719","article-title":"Flush+ reload: A high resolution, low noise, l3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"USENIX Security Symposium"},{"article-title":"Meltdown","year":"2018","author":"lipp","key":"ref9"},{"key":"ref46","first-page":"169","article-title":"Theoretical use of cache memory as a cryptanalytic side- channel","volume":"2002","author":"page","year":"2002","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055858"},{"article-title":"Cache missing for fun and profit","year":"2005","author":"percival","key":"ref48"},{"key":"ref47","first-page":"667","article-title":"Cache-timing template attacks","author":"brumley","year":"2009","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.34"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046737"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866374"}],"event":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2020,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2020,5,21]]}},"container-title":["2020 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9144328\/9152199\/09152649.pdf?arnumber=9152649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T07:08:01Z","timestamp":1667632081000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9152649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/sp40000.2020.00007","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}