{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:24:14Z","timestamp":1730323454971,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,17]],"date-time":"2022-04-17T00:00:00Z","timestamp":1650153600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["HR0011-20-C-0039"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3445814.3446729","type":"proceedings-article","created":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T17:06:26Z","timestamp":1618160786000},"page":"758-772","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Computing with time: microarchitectural weird machines"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0549-0438","authenticated-orcid":false,"given":"Dmitry","family":"Evtyushkin","sequence":"first","affiliation":[{"name":"College of William & Mary, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9758-0712","authenticated-orcid":false,"given":"Thomas","family":"Benjamin","sequence":"additional","affiliation":[{"name":"Perspecta Labs, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6679-1624","authenticated-orcid":false,"given":"Jesse","family":"Elwell","sequence":"additional","affiliation":[{"name":"Perspecta Labs, USA"}]},{"given":"Jeffrey A.","family":"Eitel","sequence":"additional","affiliation":[{"name":"Perspecta Labs, USA"}]},{"given":"Angelo","family":"Sapello","sequence":"additional","affiliation":[{"name":"Perspecta Labs, USA"}]},{"given":"Abhrajit","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Perspecta Labs, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2001.932501"},{"key":"e_1_3_2_1_3_1","volume-title":"Camil Demetrescu, and Irene Finocchi.","author":"Baldoni Roberto","year":"2018","unstructured":"Roberto Baldoni , Emilio Coppa , Daniele Cono D'elia , Camil Demetrescu, and Irene Finocchi. 2018 . A survey of symbolic execution techniques. ACM Computing Surveys (CSUR) 51, 3 ( 2018 ), 1-39. Roberto Baldoni, Emilio Coppa, Daniele Cono D'elia, Camil Demetrescu, and Irene Finocchi. 2018. A survey of symbolic execution techniques. ACM Computing Surveys (CSUR) 51, 3 ( 2018 ), 1-39."},{"volume-title":"Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs. dartmouth.edu\/~sergey\/wm\/woot13-bangert.pdf.","author":"Bangert Julian","key":"e_1_3_2_1_4_1","unstructured":"Julian Bangert , Sergey Bratus , Rebecca Shapiro , and Sean W Smith . 2013. The Page-Fault Weird Machine: Lessons in Instruction-less Computation . In Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs. dartmouth.edu\/~sergey\/wm\/woot13-bangert.pdf. Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W Smith. 2013. The Page-Fault Weird Machine: Lessons in Instruction-less Computation. In Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs. dartmouth.edu\/~sergey\/wm\/woot13-bangert.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"The Sixth Workshop on Language-Theoretic Security (LangSec) ( 2020 ). http:\/\/spw20","author":"Benjamin Thomas","year":"2020","unstructured":"Thomas Benjamin , Jef Eitel , Jesse Elwell , Dmitry Evtyushkin , and Ghosh Abhrajit . 2020 . Weird Circuits in CPU Microarchitectures. Presentation , The Sixth Workshop on Language-Theoretic Security (LangSec) ( 2020 ). http:\/\/spw20 .langsec.org\/slides\/ WeirdCircuits_LangSec 2020.pdf, Accessed: 2020-12-18. Thomas Benjamin, Jef Eitel, Jesse Elwell, Dmitry Evtyushkin, and Ghosh Abhrajit. 2020. Weird Circuits in CPU Microarchitectures. Presentation, The Sixth Workshop on Language-Theoretic Security (LangSec) ( 2020 ). http:\/\/spw20.langsec.org\/slides\/ WeirdCircuits_LangSec2020.pdf, Accessed: 2020-12-18."},{"key":"e_1_3_2_1_6_1","first-page":"291","volume-title":"USENIX Security Symposium","volume":"12","author":"Bhatkar Sandeep","year":"2003","unstructured":"Sandeep Bhatkar , Daniel C DuVarney , and Ron Sekar . 2003 . Address Obfuscation: An Eficient Approach to Combat a Broad Range of Memory Error Exploits .. In USENIX Security Symposium , Vol. 12 . 291 - 301 . Sandeep Bhatkar, Daniel C DuVarney, and Ron Sekar. 2003. Address Obfuscation: An Eficient Approach to Combat a Broad Range of Memory Error Exploits.. In USENIX Security Symposium, Vol. 12. 291-301."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24690-6_6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.20"},{"key":"e_1_3_2_1_9_1","unstructured":"Sergey Bratus. What are Weird Machines? https:\/\/www.cs.dartmouth.edu\/ ~sergey\/wm\/. Accessed: 2020-12-18. Sergey Bratus. What are Weird Machines? https:\/\/www.cs.dartmouth.edu\/ ~sergey\/wm\/. Accessed: 2020-12-18."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jerry R Burch Edmund M Clarke Kenneth L McMillan David L Dill and LainJinn Hwang. 1992. Symbolic model checking: 1020 states and beyond. Information and computation 98 2 ( 1992 ) 142-170. Jerry R Burch Edmund M Clarke Kenneth L McMillan David L Dill and LainJinn Hwang. 1992. Symbolic model checking: 1020 states and beyond. Information and computation 98 2 ( 1992 ) 142-170.","DOI":"10.1016\/0890-5401(92)90017-A"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_13_1","volume-title":"28th USENIX Security Symposium (USENIX) Security 19 ). 249-266","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella , Jo Van Bulck , Michael Schwarz , Moritz Lipp , Benjamin Von Berg , Philipp Ortner , Frank Piessens , Dmitry Evtyushkin , and Daniel Gruss . 2019 . A systematic evaluation of transient execution attacks and defenses . In 28th USENIX Security Symposium (USENIX) Security 19 ). 249-266 . Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin Von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A systematic evaluation of transient execution attacks and defenses. In 28th USENIX Security Symposium (USENIX) Security 19 ). 249-266."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"volume-title":"Intel's System Management Mode. ([n. d.])","author":"Collins Robert","key":"e_1_3_2_1_16_1","unstructured":"Robert Collins . Intel's System Management Mode. ([n. d.]) . http:\/\/www.rcollins. org\/ddj\/Jan97\/Jan97.html, Accessed: 2021-01-26. Robert Collins. Intel's System Management Mode. ([n. d.]). http:\/\/www.rcollins. org\/ddj\/Jan97\/Jan97.html, Accessed: 2021-01-26."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299877"},{"key":"e_1_3_2_1_18_1","first-page":"479","article-title":"Systems and methods for behavioral sandboxing","volume":"8","author":"Dalcher Gregory William","year":"2013","unstructured":"Gregory William Dalcher and John D Teddy . 2013 . Systems and methods for behavioral sandboxing . US Patent 8 , 479 , 286. Gregory William Dalcher and John D Teddy. 2013. Systems and methods for behavioral sandboxing. US Patent 8, 479, 286.","journal-title":"US Patent"},{"key":"e_1_3_2_1_19_1","unstructured":"Christopher Domas. 2017. Breaking the x86 ISA. Black Hat ( 2017 ). Christopher Domas. 2017. Breaking the x86 ISA. Black Hat ( 2017 )."},{"key":"e_1_3_2_1_20_1","volume-title":"Weird machines, exploitability, and provable unexploitability","author":"Dullien Thomas F","year":"2017","unstructured":"Thomas F Dullien . 2017. Weird machines, exploitability, and provable unexploitability . IEEE Transactions on Emerging Topics in Computing ( 2017 ). Thomas F Dullien. 2017. Weird machines, exploitability, and provable unexploitability. IEEE Transactions on Emerging Topics in Computing ( 2017 )."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_1_23_1","volume-title":"ECE, and Dmitry Ponomarev.","author":"Evtyushkin Dmitry","year":"2018","unstructured":"Dmitry Evtyushkin , Ryan Riley , Nael CSE Abu-Ghazaleh , ECE, and Dmitry Ponomarev. 2018 . Branchscope : A new side-channel attack on directional branch predictor. ACM SIGPLAN Notices 53, 2 ( 2018 ), 693-707. Dmitry Evtyushkin, Ryan Riley, Nael CSE Abu-Ghazaleh, ECE, and Dmitry Ponomarev. 2018. Branchscope: A new side-channel attack on directional branch predictor. ACM SIGPLAN Notices 53, 2 ( 2018 ), 693-707."},{"key":"e_1_3_2_1_24_1","first-page":"275","volume-title":"BUZZ: Testing Context-Dependent Policies in Stateful Networks. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Fayaz Seyed K","year":"2016","unstructured":"Seyed K Fayaz , Tianlong Yu , Yoshiaki Tobioka , Sagar Chaki , and Vyas Sekar . 2016 . BUZZ: Testing Context-Dependent Policies in Stateful Networks. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . 275 - 289 . Seyed K Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, and Vyas Sekar. 2016. BUZZ: Testing Context-Dependent Policies in Stateful Networks. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 275-289."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190315.1190325"},{"key":"e_1_3_2_1_26_1","first-page":"293","volume-title":"USENIX Annual Technical Conference","author":"Ford Bryan","year":"2008","unstructured":"Bryan Ford and Russ Cox . 2008 . Vx32: Lightweight User-level Sandboxing on the x86 .. In USENIX Annual Technical Conference . Boston, MA , 293 - 306 . Bryan Ford and Russ Cox. 2008. Vx32: Lightweight User-level Sandboxing on the x86.. In USENIX Annual Technical Conference. Boston, MA, 293-306."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00011"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747939"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3168451.3168479"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655151"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317903"},{"key":"e_1_3_2_1_34_1","volume-title":"Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv","author":"Kocher Paul","year":"1801","unstructured":"Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2018. Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv : 1801 . 01203 ( 2018 ). https:\/\/spectreattack.com\/spectre.pdf. Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv: 1801. 01203 ( 2018 ). https:\/\/spectreattack.com\/spectre.pdf."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Xavier Leroy. 2009. Formal verification of a realistic compiler. Commun. ACM 52 7 ( 2009 ) 107-115. Xavier Leroy. 2009. Formal verification of a realistic compiler. Commun. ACM 52 7 ( 2009 ) 107-115.","DOI":"10.1145\/1538788.1538814"},{"key":"e_1_3_2_1_36_1","unstructured":"Xavier Leroy et al. 2012. The CompCert verified compiler. Documentation and user's manual. INRIA Paris-Rocquencourt 53 ( 2012 ). Xavier Leroy et al. 2012. The CompCert verified compiler. Documentation and user's manual. INRIA Paris-Rocquencourt 53 ( 2012 )."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_38_1","volume-title":"arXiv preprint arXiv","author":"Lipp Moritz","year":"1801","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. arXiv preprint arXiv : 1801 . 01207 ( 2018 ). https:\/\/arxiv.org\/pdf\/ 1801.01207. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. arXiv preprint arXiv: 1801. 01207 ( 2018 ). https:\/\/arxiv.org\/pdf\/ 1801.01207."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359837"},{"key":"e_1_3_2_1_40_1","volume-title":"Spectre is here to stay: An analysis of side-channels and speculative execution. arXiv preprint arXiv","author":"Mcilroy Ross","year":"1902","unstructured":"Ross Mcilroy , Jaroslav Sevcik , Tobias Tebbi , Ben L Titzer , and Toon Verwaest . 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. arXiv preprint arXiv : 1902 . 05178 ( 2019 ). Ross Mcilroy, Jaroslav Sevcik, Tobias Tebbi, Ben L Titzer, and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. arXiv preprint arXiv: 1902. 05178 ( 2019 )."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/10721959_2"},{"key":"e_1_3_2_1_42_1","volume-title":"Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, and Yuval Yarom.","author":"Minkin Marina","year":"2019","unstructured":"Marina Minkin , Daniel Moghimi , Moritz Lipp , Michael Schwarz , Jo Van Bulck , Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, and Yuval Yarom. 2019 . Fallout : Reading kernel writes from user space. arXiv preprint arXiv:1905. 12701 ( 2019 ). Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, and Yuval Yarom. 2019. Fallout: Reading kernel writes from user space. arXiv preprint arXiv:1905. 12701 ( 2019 )."},{"key":"e_1_3_2_1_43_1","volume-title":"PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1124-1137","author":"Mirbagher-Ajorpaz Samira","year":"2020","unstructured":"Samira Mirbagher-Ajorpaz , Gilles Pokam , Esmaeil Mohammadian-Koruyeh , Elba Garza , Nael Abu-Ghazaleh , and Daniel A Jim\u00e9nez . 2020 . PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1124-1137 . Samira Mirbagher-Ajorpaz, Gilles Pokam, Esmaeil Mohammadian-Koruyeh, Elba Garza, Nael Abu-Ghazaleh, and Daniel A Jim\u00e9nez. 2020. PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1124-1137."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_45_1","first-page":"3","volume-title":"NDSS","volume":"5","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Xiaodong Song . 2005 . Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software .. In NDSS , Vol. 5 . Citeseer , 3 - 4 . James Newsome and Dawn Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.. In NDSS, Vol. 5. Citeseer, 3-4."},{"key":"e_1_3_2_1_46_1","first-page":"91","article-title":"Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code","author":"Oakley James","year":"2011","unstructured":"James Oakley and Sergey Bratus . 2011 . Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code .. In WOOT. 91 - 102 . James Oakley and Sergey Bratus. 2011. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.. In WOOT. 91-102.","journal-title":"WOOT."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322216"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Sebastian Schrittwieser Stefan Katzenbeisser Johannes Kinder Georg Merzdovnik and Edgar Weippl. 2016. Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Computing Surveys (CSUR) 49 1 ( 2016 ) 1-37. Sebastian Schrittwieser Stefan Katzenbeisser Johannes Kinder Georg Merzdovnik and Edgar Weippl. 2016. Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Computing Surveys (CSUR) 49 1 ( 2016 ) 1-37.","DOI":"10.1145\/2886012"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"volume-title":"Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs.dartmouth.edu\/ ~sergey\/wm\/woot13-shapiro.pdf.","author":"Shapiro Rebecca","key":"e_1_3_2_1_55_1","unstructured":"Rebecca Shapiro , Sergey Bratus , and Sean W Smith . 2013. ? Weird Machines? in ELF : A Spotlight on the Underappreciated Metadata . In Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs.dartmouth.edu\/ ~sergey\/wm\/woot13-shapiro.pdf. Rebecca Shapiro, Sergey Bratus, and Sean W Smith. 2013. ? Weird Machines? in ELF: A Spotlight on the Underappreciated Metadata. In Presented as part of the 7th USENIX Workshop on Ofensive Technologies. https:\/\/www.cs.dartmouth.edu\/ ~sergey\/wm\/woot13-shapiro.pdf."},{"key":"e_1_3_2_1_56_1","unstructured":"Monirul I Sharif Andrea Lanzi Jonathon T Gifin and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation.. In NDSS. Monirul I Sharif Andrea Lanzi Jonathon T Gifin and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation.. In NDSS."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"e_1_3_2_1_58_1","unstructured":"Jakub Szefer. 2018. Survey of Microarchitectural Side and Covert Channels Attacks and Defenses. Journal of Hardware and Systems Security ( 2018 ) 1-16. https: \/\/pdfs.semanticscholar.org\/4b99\/854f2aac10f41902b738c4b783d7c187a61a.pdf. Jakub Szefer. 2018. Survey of Microarchitectural Side and Covert Channels Attacks and Defenses. Journal of Hardware and Systems Security ( 2018 ) 1-16. https: \/\/pdfs.semanticscholar.org\/4b99\/854f2aac10f41902b738c4b783d7c187a61a.pdf."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0046-1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Jack Wampler Ian Martiny and Eric Wustrow. 2019. ExSpectre: Hiding Malware in Speculative Execution.. In NDSS. Jack Wampler Ian Martiny and Eric Wustrow. 2019. ExSpectre: Hiding Malware in Speculative Execution.. In NDSS.","DOI":"10.14722\/ndss.2019.23409"},{"key":"e_1_3_2_1_62_1","unstructured":"Guanhua Wang Sudipta Chattopadhyay Ivan Gotovchits Tulika Mitra and Abhik Roychoudhury. 2018. oo7: Low-overhead defense against spectre attacks via binary analysis. arXiv preprint arXiv:1807. 05843 ( 2018 ). Guanhua Wang Sudipta Chattopadhyay Ivan Gotovchits Tulika Mitra and Abhik Roychoudhury. 2018. oo7: Low-overhead defense against spectre attacks via binary analysis. arXiv preprint arXiv:1807. 05843 ( 2018 )."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_1_64_1","volume-title":"SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. arXiv preprint arXiv","author":"Xiao Yuan","year":"2019","unstructured":"Yuan Xiao , Yinqian Zhang , and Radu Teodorescu . 2019 . SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. arXiv preprint arXiv : 1912. 00329 ( 2019 ). Yuan Xiao, Yinqian Zhang, and Radu Teodorescu. 2019. SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. arXiv preprint arXiv: 1912. 00329 ( 2019 )."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00021"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({ USENIX} Security 13). 337-352.","author":"Zhang Mingwei","key":"e_1_3_2_1_68_1","unstructured":"Mingwei Zhang and R Sekar . 2013. Control Flow Integrity for {COTS} Binaries . In Presented as part of the 22nd {USENIX} Security Symposium ({ USENIX} Security 13). 337-352. Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for {COTS} Binaries. In Presented as part of the 22nd {USENIX} Security Symposium ({ USENIX} Security 13). 337-352."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"}],"event":{"name":"ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Virtual USA","acronym":"ASPLOS '21"},"container-title":["Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3445814.3446729","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445814.3446729","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445814.3446729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T04:21:14Z","timestamp":1683001274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445814.3446729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,17]]},"references-count":69,"alternative-id":["10.1145\/3445814.3446729","10.1145\/3445814"],"URL":"https:\/\/doi.org\/10.1145\/3445814.3446729","relation":{},"subject":[],"published":{"date-parts":[[2021,4,17]]},"assertion":[{"value":"2021-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}