{"id":"https://openalex.org/W7126056040","doi":"https://doi.org/10.1109/comcomap68359.2025.11353166","title":"Bypass Synchronization Primitives: GhostRace Attack and Mitigation on RISC-V","display_name":"Bypass Synchronization Primitives: GhostRace Attack and Mitigation on RISC-V","publication_year":2025,"publication_date":"2025-12-14","ids":{"openalex":"https://openalex.org/W7126056040","doi":"https://doi.org/10.1109/comcomap68359.2025.11353166"},"language":null,"primary_location":{"id":"doi:10.1109/comcomap68359.2025.11353166","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap68359.2025.11353166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121681761","display_name":"Mahreen Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mahreen Khan","raw_affiliation_strings":["Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124277317","display_name":"Maria Priscilla Lima Medeiros","orcid":null},"institutions":[{"id":"https://openalex.org/I33501960","display_name":"Universidade Federal de Santa Maria","ror":"https://ror.org/01b78mz79","country_code":"BR","type":"education","lineage":["https://openalex.org/I33501960"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Maria Priscilla Lima Medeiros","raw_affiliation_strings":["Federal University of Santa Maria,Santa Maria,Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Santa Maria,Santa Maria,Brazil","institution_ids":["https://openalex.org/I33501960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124271987","display_name":"Matheus Victor de Freitas Rodrigues","orcid":null},"institutions":[{"id":"https://openalex.org/I33501960","display_name":"Universidade Federal de Santa Maria","ror":"https://ror.org/01b78mz79","country_code":"BR","type":"education","lineage":["https://openalex.org/I33501960"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Matheus Victor de Freitas Rodrigues","raw_affiliation_strings":["Federal University of Santa Maria,Santa Maria,Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Santa Maria,Santa Maria,Brazil","institution_ids":["https://openalex.org/I33501960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101731862","display_name":"Maria Mushtaq","orcid":"https://orcid.org/0000-0002-9805-3076"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Maria Mushtaq","raw_affiliation_strings":["Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124221415","display_name":"Renaud Pacalet","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Renaud Pacalet","raw_affiliation_strings":["Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ludovic Apvrille","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ludovic Apvrille","raw_affiliation_strings":["Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117111786","display_name":"Lirida Naviner","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Lirida Naviner","raw_affiliation_strings":["Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France"],"affiliations":[{"raw_affiliation_string":"Institut Polytechnique de Paris,Telecom Paris,Palaiseau,France","institution_ids":["https://openalex.org/I12356871"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5121681761"],"corresponding_institution_ids":["https://openalex.org/I12356871"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85224496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"213","last_page":"220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7073000073432922,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7073000073432922,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.1460999995470047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.07039999961853027,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6444000005722046},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.6255999803543091},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5841000080108643},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.529699981212616},{"id":"https://openalex.org/keywords/serialization","display_name":"Serialization","score":0.46299999952316284},{"id":"https://openalex.org/keywords/data-synchronization","display_name":"Data synchronization","score":0.41620001196861267},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4027000069618225},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.3855000138282776},{"id":"https://openalex.org/keywords/nexus","display_name":"Nexus (standard)","score":0.36649999022483826},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.35850000381469727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069000244140625},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6444000005722046},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.6255999803543091},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5841000080108643},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.529699981212616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49709999561309814},{"id":"https://openalex.org/C52723943","wikidata":"https://www.wikidata.org/wiki/Q1127410","display_name":"Serialization","level":2,"score":0.46299999952316284},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43790000677108765},{"id":"https://openalex.org/C108734733","wikidata":"https://www.wikidata.org/wiki/Q1172333","display_name":"Data synchronization","level":3,"score":0.41620001196861267},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4027000069618225},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3855000138282776},{"id":"https://openalex.org/C148609458","wikidata":"https://www.wikidata.org/wiki/Q7021281","display_name":"Nexus (standard)","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.35850000381469727},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.35190001130104065},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.33489999175071716},{"id":"https://openalex.org/C188045909","wikidata":"https://www.wikidata.org/wiki/Q3306359","display_name":"Atomicity","level":3,"score":0.32249999046325684},{"id":"https://openalex.org/C1793878","wikidata":"https://www.wikidata.org/wiki/Q1153762","display_name":"Out-of-order execution","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.3138999938964844},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3107999861240387},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30709999799728394},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.296999990940094},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.27300000190734863},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comcomap68359.2025.11353166","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap68359.2025.11353166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6554416418075562,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2131726714","https://openalex.org/W2157790661","https://openalex.org/W2783366817","https://openalex.org/W2978325751","https://openalex.org/W3036557299","https://openalex.org/W4384948664","https://openalex.org/W4410095577"],"related_works":[],"abstract_inverted_index":{"In":[0,101],"communication":[1,37,72,94],"and":[2,12,27,39,93,115,126,140],"network":[3],"security":[4,68,98],"systems,":[5],"synchronization":[6,53,124],"primitives":[7],"(such":[8],"as":[9],"mutexes,":[10],"semaphores,":[11],"spinlocks)":[13],"are":[14],"essential":[15],"for":[16,36,83,162],"ensuring":[17],"safe":[18],"access":[19],"to":[20,50],"shared":[21],"data.":[22],"They":[23],"prevent":[24],"data":[25,61],"races":[26],"enforce":[28],"memory":[29],"consistency":[30],"across":[31,62],"threads,":[32],"which":[33],"is":[34,76,88],"critical":[35,71],"stacks":[38],"cryptographic":[40],"libraries.":[41],"However,":[42],"the":[43,67,111,116,128,151,160],"recent":[44],"GhostRace":[45,75,106,156],"vulnerability":[46],"exploits":[47],"speculative":[48,56,123],"execution":[49],"microarchitecturally":[51],"bypass":[52],"primitives,":[54],"creating":[55],"race":[57],"conditions":[58],"that":[59],"leak":[60],"threads.":[63],"This":[64,148],"fundamentally":[65],"undermines":[66],"guarantees":[69],"of":[70,155],"infrastructure.":[73],"While":[74],"tested":[77],"on":[78,107,157],"x86":[79],"architecture,":[80],"its":[81,97],"implications":[82],"RISC-V":[84,87,108,113],"remain":[85],"unexplored.":[86],"increasingly":[89],"adopted":[90],"in":[91],"networking":[92],"hardware,":[95],"making":[96],"analysis":[99],"essential.":[100],"this":[102],"paper,":[103],"we":[104],"evaluate":[105],"using":[109,143],"both":[110],"BeagleV-Fire":[112],"board":[114],"gem5":[117,144],"full-system":[118],"simulator.":[119],"We":[120,132],"demonstrate":[121],"successful":[122],"bypasses":[125],"validate":[127],"instruction":[129],"serialization":[130],"mitigation.":[131],"also":[133],"analyze":[134],"microarchitectural":[135],"behavior,":[136],"including":[137],"cache":[138],"misses":[139],"branch":[141],"mispredictions,":[142],"full":[145],"system":[146],"simulations.":[147],"paper":[149],"provides":[150],"first":[152],"comprehensive":[153],"characterization":[154],"RISC-V,":[158],"highlighting":[159],"need":[161],"secure":[163],"hardware-software":[164],"co-design.":[165]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-30T00:00:00"}
