{"id":"https://openalex.org/W4402264057","doi":"https://doi.org/10.1109/sp54263.2024.00047","title":"Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs","display_name":"Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs","publication_year":2024,"publication_date":"2024-05-19","ids":{"openalex":"https://openalex.org/W4402264057","doi":"https://doi.org/10.1109/sp54263.2024.00047"},"language":"en","primary_location":{"id":"doi:10.1109/sp54263.2024.00047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp54263.2024.00047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/retrieve/97d35142-167c-47ab-95be-cdd7cd4419ab","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042616075","display_name":"Hans Winderix","orcid":"https://orcid.org/0000-0002-0165-7915"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]}],"countries":["BE","NL"],"is_corresponding":true,"raw_author_name":"Hans Winderix","raw_affiliation_strings":["KU Leuven,Imec-DistriNet"],"affiliations":[{"raw_affiliation_string":"KU Leuven,Imec-DistriNet","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028155354","display_name":"M\u00e1rton Bogn\u00e1r","orcid":"https://orcid.org/0000-0002-8641-7549"},"institutions":[{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE","NL"],"is_corresponding":false,"raw_author_name":"Marton Bognar","raw_affiliation_strings":["KU Leuven,Imec-DistriNet"],"affiliations":[{"raw_affiliation_string":"KU Leuven,Imec-DistriNet","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029798411","display_name":"Job Noorman","orcid":"https://orcid.org/0000-0002-5287-2543"},"institutions":[{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE","NL"],"is_corresponding":false,"raw_author_name":"Job Noorman","raw_affiliation_strings":["KU Leuven,Imec-DistriNet"],"affiliations":[{"raw_affiliation_string":"KU Leuven,Imec-DistriNet","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089892476","display_name":"Lesly-Ann Daniel","orcid":"https://orcid.org/0000-0002-2772-3722"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]}],"countries":["BE","NL"],"is_corresponding":false,"raw_author_name":"Lesly-Ann Daniel","raw_affiliation_strings":["KU Leuven,Imec-DistriNet"],"affiliations":[{"raw_affiliation_string":"KU Leuven,Imec-DistriNet","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008329832","display_name":"Frank Piessens","orcid":"https://orcid.org/0000-0001-5438-153X"},"institutions":[{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE","NL"],"is_corresponding":false,"raw_author_name":"Frank Piessens","raw_affiliation_strings":["KU Leuven,Imec-DistriNet"],"affiliations":[{"raw_affiliation_string":"KU Leuven,Imec-DistriNet","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042616075"],"corresponding_institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":1.0632,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81082875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"3697","last_page":"3715"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimicry","display_name":"Mimicry","score":0.7575099468231201},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6994140148162842},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5827572345733643},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4746737480163574},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4129127264022827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32303380966186523},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1726224720478058},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15680506825447083},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.0985228419303894}],"concepts":[{"id":"https://openalex.org/C7863114","wikidata":"https://www.wikidata.org/wiki/Q192627","display_name":"Mimicry","level":2,"score":0.7575099468231201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6994140148162842},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5827572345733643},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4746737480163574},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4129127264022827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32303380966186523},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1726224720478058},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15680506825447083},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0985228419303894},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/sp54263.2024.00047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp54263.2024.00047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/724354","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/724354","pdf_url":"https://lirias.kuleuven.be/retrieve/97d35142-167c-47ab-95be-cdd7cd4419ab","source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Symposium on Security and Privacy 2024, San Francisco, 20-23 May 2024","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/724354","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/724354","pdf_url":"https://lirias.kuleuven.be/retrieve/97d35142-167c-47ab-95be-cdd7cd4419ab","source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Symposium on Security and Privacy 2024, San Francisco, 20-23 May 2024","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321730","display_name":"Fonds Wetenschappelijk Onderzoek","ror":"https://ror.org/03qtxy027"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null},{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402264057.pdf","grobid_xml":"https://content.openalex.org/works/W4402264057.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W186684821","https://openalex.org/W1531820677","https://openalex.org/W1613874182","https://openalex.org/W1664413462","https://openalex.org/W1990628327","https://openalex.org/W1997775274","https://openalex.org/W2005756274","https://openalex.org/W2104647943","https://openalex.org/W2128255161","https://openalex.org/W2154909745","https://openalex.org/W2163005041","https://openalex.org/W2170993700","https://openalex.org/W2294648786","https://openalex.org/W2460965380","https://openalex.org/W2462805800","https://openalex.org/W2562036180","https://openalex.org/W2597472572","https://openalex.org/W2744175342","https://openalex.org/W2744505673","https://openalex.org/W2766052299","https://openalex.org/W2766068839","https://openalex.org/W2766545755","https://openalex.org/W2796933658","https://openalex.org/W2803579379","https://openalex.org/W2860564492","https://openalex.org/W2886207505","https://openalex.org/W2890914193","https://openalex.org/W2899157124","https://openalex.org/W2900479912","https://openalex.org/W2963047853","https://openalex.org/W2995664728","https://openalex.org/W2999016616","https://openalex.org/W3015465581","https://openalex.org/W3015806656","https://openalex.org/W3034103899","https://openalex.org/W3080541705","https://openalex.org/W3082893125","https://openalex.org/W3093630729","https://openalex.org/W3116069515","https://openalex.org/W3153001680","https://openalex.org/W3153387123","https://openalex.org/W3155543450","https://openalex.org/W3198421887","https://openalex.org/W3207150733","https://openalex.org/W3212308234","https://openalex.org/W3212767233","https://openalex.org/W4226361164","https://openalex.org/W4246166885","https://openalex.org/W4281986595","https://openalex.org/W4282813657","https://openalex.org/W4288057759","https://openalex.org/W4367847590","https://openalex.org/W4385412162","https://openalex.org/W6637116351","https://openalex.org/W6718621806","https://openalex.org/W6742390660","https://openalex.org/W6756740455","https://openalex.org/W6779340927","https://openalex.org/W6788424163","https://openalex.org/W6996025147","https://openalex.org/W7042459334"],"related_works":["https://openalex.org/W2566749067","https://openalex.org/W2332959588","https://openalex.org/W2159218316","https://openalex.org/W2379994817","https://openalex.org/W2373086291","https://openalex.org/W3158429762","https://openalex.org/W1980659691","https://openalex.org/W2132785383","https://openalex.org/W4232883466","https://openalex.org/W4385683480"],"abstract_inverted_index":{"The":[0],"control":[1,15,37,183],"flow":[2,16,38,184],"of":[3,35,166,231],"a":[4,84,111,117,176],"program":[5],"can":[6,21],"often":[7],"be":[8,71],"observed":[9],"through":[10],"side-channel":[11],"attacks.":[12],"Hence,":[13],"when":[14],"depends":[17],"on":[18,42,45,213],"secrets,":[19,43],"attackers":[20],"learn":[22],"information":[23],"about":[24],"these":[25,67,98,108],"secrets.":[26],"Widely":[27],"used":[28],"software-based":[29],"countermeasures":[30],"ensure":[31],"that":[32,80,123,181,203,219],"attacker-observable":[33,131],"aspects":[34],"the":[36,60,63,162,190,196,204,214,229],"do":[39],"not":[40,82],"depend":[41],"relying":[44],"techniques":[46,68,109],"like":[47],"dummy":[48],"execution":[49,55,154,172],"(for":[50,56],"balancing":[51],"code)":[52],"or":[53,157],"conditional":[54],"linearizing":[57],"code).":[58],"In":[59,225],"current":[61],"state-of-practice,":[62],"primitives":[64],"to":[65,70,86,90,150,155],"implement":[66],"have":[69],"found":[72],"in":[73,110,185,237],"an":[74,125],"existing":[75],"instruction":[76,126,193],"set":[77],"architecture":[78],"(ISA)":[79],"was":[81],"designed":[83],"priori":[85],"provide":[87],"them,":[88],"leading":[89],"performance,":[91],"security,":[92],"and":[93,133,138,147,164,173,195,218],"portability":[94],"issues.":[95],"To":[96],"counter":[97],"issues,":[99],"this":[100],"paper":[101],"proposes":[102],"lightweight":[103],"hardware":[104,119,205],"extensions":[105],"for":[106,129,144,175],"supporting":[107],"principled":[112],"way.":[113],"We":[114,160],"propose":[115],"(1)":[116],"novel":[118],"mechanism":[120],"(mimic":[121],"execution),":[122],"executes":[124],"stream":[127],"only":[128],"its":[130],"effects,":[132,137],"suppresses":[134],"(most)":[135],"architectural":[136],"(2)":[139],"ISA":[140],"support":[141],"(called":[142],"AMi,":[143],"Architectural":[145],"Mimicry)":[146],"programming":[148],"models":[149],"effectively":[151],"use":[152],"mimic":[153,171],"balance":[156],"linearize":[158],"code.":[159],"show":[161],"feasibility":[163],"benefits":[165],"our":[167,238],"proposal":[168],"by":[169,235],"implementing":[170],"AMi":[174,220,227],"32-bit":[177],"out-of-order":[178],"RISC-V":[179],"core":[180],"leaks":[182],"multiple":[186],"ways":[187],"(via":[188],"e.g.,":[189],"branch":[191],"predictor,":[192],"timings,":[194],"data":[197],"cache).":[198],"Our":[199],"experimental":[200],"evaluation":[201],"shows":[202],"cost":[206],"is":[207],"low":[208],"(most":[209],"importantly,":[210],"no":[211],"impact":[212],"processor\u2032s":[215],"critical":[216],"path),":[217],"enables":[221],"significant":[222],"performance":[223],"improvements.":[224],"particular,":[226],"reduces":[228],"overhead":[230],"state-of-the-art":[232],"linearized":[233],"code":[234],"60%":[236],"benchmarks.":[239]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
