{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:26Z","timestamp":1750220186206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T00:00:00Z","timestamp":1657411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The National Science Fund for Distinguished Young Scholars","award":["62125208"],"award-info":[{"award-number":["62125208"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,10]]},"DOI":"10.1145\/3489517.3530679","type":"proceedings-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T23:19:29Z","timestamp":1661296769000},"page":"547-552","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Conditional address propagation"],"prefix":"10.1145","author":[{"given":"Peinan","family":"Li","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences"}]},{"given":"Rui","family":"Hou","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences"}]},{"given":"Lutan","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences"}]},{"given":"Yifan","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jamison Collins and otheres. 2002. Pointer cache assisted prefetching. In MICRO."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Townley Daniel and Ponomarev Dmitry. 2019. SMT-COP: Defeating Side-Channel Attacks on Execution Units in SMT Processors. In PACT.","DOI":"10.1109\/PACT.2019.00012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jacob Fustos Farzad Farshchi and Heechul Yun. 2019. SpectreGuard: An Efficient Data-centric Defense Mechanism against Spectre Attacks. In DAC.","DOI":"10.1145\/3316781.3317914"},{"key":"e_1_3_2_1_4_1","volume-title":"EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs. In USENIX ATC.","author":"Hua Zhichao","year":"2018","unstructured":"Zhichao Hua, Dong Du, Yubin Xia, et al. 2018. EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs. In USENIX ATC."},{"key":"e_1_3_2_1_5_1","volume-title":"Esmaeil Mohammadian Koruyeh, et al","author":"Khasawneh Khaled N.","year":"2019","unstructured":"Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, et al. 2019. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. In DAC."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Paul Kocher Jann Horn Anders Fogh et al. 2019. Spectre attacks: Exploiting speculative execution. In S&P.","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Barber Kristin Bacha Anys Zhou Li et al. 2019. SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. In PACT.","DOI":"10.1109\/PACT.2019.00020"},{"key":"e_1_3_2_1_8_1","volume-title":"Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution against Spectre Attacks. In HPCA.","author":"Li Peinan","year":"2019","unstructured":"Peinan Li, Lutan Zhao, et al. 2019. Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution against Spectre Attacks. In HPCA."},{"key":"e_1_3_2_1_9_1","volume-title":"Meltdown: Reading Kernel Memory from User Space. In USENIX Security.","author":"Moritz Lipp","year":"2018","unstructured":"Lipp Moritz, Schwarz Michael, Gruss Daniel, et al. 2018. Meltdown: Reading Kernel Memory from User Space. In USENIX Security."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Moritz Lipp Daniel Moghimi et al. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. In CCS. 1--16.","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Martin Schwarzl Moritz Lipp Jon Masters and Daniel Gruss. 2019. NetSpectre: Read Arbitrary Memory over Network. In ESORICS.","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"e_1_3_2_1_12_1","unstructured":"Mohammadkazem Taram Ashish Venkat et al. 2019. Context-Sensitive Fencing: Securing speculative execution via microcode customization. In ASPLOS."},{"key":"e_1_3_2_1_13_1","volume-title":"LVI: Hijacking transient execution through microarchitectural load value injection. In S&P.","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck et al. 2020. LVI: Hijacking transient execution through microarchitectural load value injection. In S&P."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358306"},{"key":"e_1_3_2_1_15_1","unstructured":"Mengjia Yan Jiho Choi Dimitrios Skarlatos et al. 2018. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. In Micro."},{"key":"e_1_3_2_1_16_1","unstructured":"Jiyong Yu Namrata Mantri et al. 2020. Speculative data-oblivious execution: Mobilizing safe prediction for safe and efficient speculative execution. In ISCA."},{"key":"e_1_3_2_1_17_1","unstructured":"Jiyong Yu Mengjia Yan Artem Khyzha et al. 2019. Speculative Taint Tracking (STT): A comprehensive protection for speculatively accessed data. In Micro."}],"event":{"name":"DAC '22: 59th ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA"],"location":"San Francisco California","acronym":"DAC '22"},"container-title":["Proceedings of the 59th ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3489517.3530679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3489517.3530679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:23Z","timestamp":1750186943000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3489517.3530679"}},"subtitle":["an efficient defense mechanism against transient execution attacks"],"short-title":[],"issued":{"date-parts":[[2022,7,10]]},"references-count":17,"alternative-id":["10.1145\/3489517.3530679","10.1145\/3489517"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3489517.3530679","relation":{},"subject":[],"published":{"date-parts":[[2022,7,10]]},"assertion":[{"value":"2022-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}