{"id":"https://openalex.org/W7128647680","doi":"https://doi.org/10.1109/asianhost68425.2025.11370372","title":"Lock+Umonitor+Umwait: Exposing the Security Risk of Lock Instruction in Achieving the Transient Execution Attack without Timer","display_name":"Lock+Umonitor+Umwait: Exposing the Security Risk of Lock Instruction in Achieving the Transient Execution Attack without Timer","publication_year":2025,"publication_date":"2025-12-19","ids":{"openalex":"https://openalex.org/W7128647680","doi":"https://doi.org/10.1109/asianhost68425.2025.11370372"},"language":null,"primary_location":{"id":"doi:10.1109/asianhost68425.2025.11370372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost68425.2025.11370372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125668994","display_name":"Yuzhang Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuzhang Duan","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125661107","display_name":"Pengfei Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Qiu","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032530802","display_name":"Chunlu Wang","orcid":"https://orcid.org/0000-0002-8647-7656"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunlu Wang","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011406278","display_name":"Yihao Deng","orcid":"https://orcid.org/0000-0002-0596-9166"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihao Deng","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361542","display_name":"Zhihao Zhang","orcid":"https://orcid.org/0000-0003-1003-9913"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihao Zhang","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125642805","display_name":"Dongsheng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongsheng Wang","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122131563","display_name":"jiaji He","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaji He","raw_affiliation_strings":["Tianjin University"],"affiliations":[{"raw_affiliation_string":"Tianjin University","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125669608","display_name":"Gang Qu","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Qu","raw_affiliation_strings":["University of Maryland College Park"],"affiliations":[{"raw_affiliation_string":"University of Maryland College Park","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5125668994"],"corresponding_institution_ids":["https://openalex.org/I4210139618"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84825649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.01759999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7702000141143799},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5205000042915344},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.4632999897003174},{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.45089998841285706},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4440000057220459},{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.4293999969959259},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.4244999885559082},{"id":"https://openalex.org/keywords/timer","display_name":"Timer","score":0.42080000042915344},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4092000126838684}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8091999888420105},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7702000141143799},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5205000042915344},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.45089998841285706},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4440000057220459},{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.4293999969959259},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.4244999885559082},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42410001158714294},{"id":"https://openalex.org/C2776633867","wikidata":"https://www.wikidata.org/wiki/Q186612","display_name":"Timer","level":3,"score":0.42080000042915344},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4092000126838684},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.3982999920845032},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.3978999853134155},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.38510000705718994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3522999882698059},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34619998931884766},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32260000705718994},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.30869999527931213},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C126298526","wikidata":"https://www.wikidata.org/wiki/Q189376","display_name":"Reduced instruction set computing","level":3,"score":0.2761000096797943},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost68425.2025.11370372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost68425.2025.11370372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5066306591033936,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Transient":[0],"execution":[1,19,100],"is":[2,182],"a":[3,62,108,139,160],"critical":[4],"technique":[5],"in":[6,53,94],"modern":[7],"processor":[8],"design":[9],"for":[10,116],"performance":[11],"enhancement.":[12],"However,":[13],"many":[14],"attacks":[15,26],"exploiting":[16],"CPU":[17],"transient":[18,43],"instructions":[20,123],"have":[21,97],"been":[22],"discovered":[23],"recently.":[24],"These":[25,83],"leak":[27,125],"sensitive":[28],"information":[29,126],"by":[30,79,189],"loading":[31],"and":[32,60,73,96,121,145],"encoding":[33],"secret":[34],"data":[35,149,172],"into":[36],"various":[37],"covert":[38,110,141,168],"channels":[39],"during":[40],"the":[41,50,67,80,87,128,166,171,186,190],"invisible":[42],"execution.":[44],"In":[45],"this":[46,104],"paper,":[47],"we":[48,106,158],"investigate":[49],"entire":[51],"Instruction":[52,56],"Intel\u2019s":[54],"x86-64":[55],"Set":[57],"Architecture":[58],"(ISA)":[59],"find":[61],"new":[63,109,161],"security":[64],"vulnerability":[65],"behind":[66],"two":[68,129],"locking":[69,131],"modes,":[70],"namely":[71],"lock-bus":[72],"lock-cache,":[74],"that":[75,118],"can":[76],"be":[77],"triggered":[78],"Lock":[81,90],"instruction.":[82],"modes":[84,132],"depend":[85],"on":[86,103,165],"status":[88],"of":[89,152],"instruction\u2019s":[91],"target":[92],"operands":[93],"memory":[95],"quite":[98],"different":[99,130],"times.":[101],"Based":[102],"observation,":[105],"propose":[107],"channel":[111,142,169],"called":[112],"Lock+Umonitor+Umwait":[113],"(or":[114],"LockUU":[115],"short),":[117],"utilizes":[119],"Umonitor":[120],"Umwait":[122],"to":[124,176],"via":[127],"without":[133],"any":[134],"timer.":[135],"We":[136],"successfully":[137],"build":[138],"real":[140],"attack":[143,163],"scenario":[144],"achieve":[146],"an":[147],"average":[148],"transmission":[150],"rate":[151,174,187],"$872":[153],"\\mathrm{~b}":[154],"/":[155,179],"\\mathrm{s}$.":[156],"Besides,":[157],"implement":[159],"Spectre-type":[162],"based":[164],"proposed":[167],"with":[170],"leakage":[173],"ups":[175],"$212":[177],"\\mathrm{~kb}":[178],"\\mathrm{s}$,":[180],"which":[181],"6%":[183],"faster":[184],"than":[185],"reported":[188],"latest":[191],"study.":[192]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-12T00:00:00"}
