{"id":"https://openalex.org/W2299561166","doi":"https://doi.org/10.1145/2870636","title":"Understanding and Mitigating Covert Channels Through Branch Predictors","display_name":"Understanding and Mitigating Covert Channels Through Branch Predictors","publication_year":2016,"publication_date":"2016-03-07","ids":{"openalex":"https://openalex.org/W2299561166","doi":"https://doi.org/10.1145/2870636","mag":"2299561166"},"language":"en","primary_location":{"id":"doi:10.1145/2870636","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2870636","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2870636&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2870636&type=pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087128492","display_name":"Dmitry Evtyushkin","orcid":"https://orcid.org/0000-0002-0549-0438"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dmitry Evtyushkin","raw_affiliation_strings":["State University of New York at Binghamton"],"affiliations":[{"raw_affiliation_string":"State University of New York at Binghamton","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101850696","display_name":"Dmitry Ponomarev","orcid":"https://orcid.org/0000-0002-7776-3933"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dmitry Ponomarev","raw_affiliation_strings":["State University of New York at Binghamton"],"affiliations":[{"raw_affiliation_string":"State University of New York at Binghamton","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059614371","display_name":"Nael Abu\u2010Ghazaleh","orcid":"https://orcid.org/0000-0002-9485-5370"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nael Abu-Ghazaleh","raw_affiliation_strings":["University of California, Riverside"],"affiliations":[{"raw_affiliation_string":"University of California, Riverside","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087128492"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":13.6933,"has_fulltext":true,"cited_by_count":72,"citation_normalized_percentile":{"value":0.98733169,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8292142152786255},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.7717380523681641},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7278569936752319},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6324872374534607},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6134360432624817},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5882679224014282},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.5381572842597961},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.4881182610988617},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.45844483375549316},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.42483675479888916},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4214692711830139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3670456111431122},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2506920397281647},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20960316061973572},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.16057735681533813},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11070123314857483},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10715264081954956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8292142152786255},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.7717380523681641},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7278569936752319},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6324872374534607},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6134360432624817},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5882679224014282},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.5381572842597961},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.4881182610988617},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.45844483375549316},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.42483675479888916},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4214692711830139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3670456111431122},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2506920397281647},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20960316061973572},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.16057735681533813},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11070123314857483},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10715264081954956},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2870636","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2870636","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2870636&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/2870636","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2870636","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2870636&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1762178203","display_name":null,"funder_award_id":"CNS-1422401","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2299561166.pdf","grobid_xml":"https://content.openalex.org/works/W2299561166.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1533145153","https://openalex.org/W1664413462","https://openalex.org/W1811605617","https://openalex.org/W1971740328","https://openalex.org/W1980073965","https://openalex.org/W2011491452","https://openalex.org/W2014182302","https://openalex.org/W2017371166","https://openalex.org/W2025539306","https://openalex.org/W2036329595","https://openalex.org/W2056778557","https://openalex.org/W2057949999","https://openalex.org/W2062340141","https://openalex.org/W2068382945","https://openalex.org/W2092160538","https://openalex.org/W2104182023","https://openalex.org/W2112826387","https://openalex.org/W2116807588","https://openalex.org/W2119028650","https://openalex.org/W2131019288","https://openalex.org/W2131129639","https://openalex.org/W2137243422","https://openalex.org/W2140078221","https://openalex.org/W2150615820","https://openalex.org/W2150620897","https://openalex.org/W2159268023","https://openalex.org/W2169461225","https://openalex.org/W2203543290","https://openalex.org/W2342204193","https://openalex.org/W3033571618","https://openalex.org/W4231917535","https://openalex.org/W4236247894"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W1568579691","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W1587013156","https://openalex.org/W4239080508","https://openalex.org/W2326198059","https://openalex.org/W4319780484","https://openalex.org/W3028997697"],"abstract_inverted_index":{"Covert":[0],"channels":[1,27,63,119,148],"through":[2,28,149],"shared":[3],"processor":[4],"resources":[5],"provide":[6],"secret":[7],"communication":[8],"between":[9],"two":[10],"malicious":[11],"processes:":[12],"the":[13,16,48,55,79,99,104,107,112,115,131,134,150],"trojan":[14,105],"and":[15,24,47,66,72,87,106,120],"spy.":[17,108],"In":[18],"this":[19,143],"article,":[20],"we":[21,43],"classify,":[22],"analyze,":[23],"compare":[25,44],"covert":[26,118,147],"dynamic":[29],"branch":[30,56,116,151],"prediction":[31,152],"units":[32],"in":[33,64,91],"modern":[34],"processors.":[35],"Through":[36],"experiments":[37],"on":[38,53,129,137,157],"a":[39,84,122],"real":[40],"hardware":[41],"platform,":[42],"contention-based":[45],"channel":[46,49,82],"that":[50,78,126,142],"is":[51,88,127],"based":[52,128],"exploiting":[54],"predictor\u2019s":[57],"residual":[58,80],"state.":[59],"We":[60,109,140],"analyze":[61],"these":[62],"SMT":[65],"single-threaded":[67],"environments":[68,94],"under":[69],"both":[70],"clean":[71],"noisy":[73,92],"conditions.":[74],"Our":[75],"results":[76],"show":[77,141],"state-based":[81],"provides":[83],"cleaner":[85],"signal":[86],"effective":[89],"even":[90],"execution":[93],"with":[95,103,154],"another":[96],"application":[97],"sharing":[98],"same":[100],"physical":[101],"core":[102],"also":[110],"estimate":[111],"capacity":[113],"of":[114,133],"predictor":[117,135],"describe":[121],"software-only":[123],"mitigation":[124],"technique":[125],"randomizing":[130],"state":[132],"tables":[136],"context":[138],"switches.":[139],"protection":[144],"eliminates":[145],"all":[146],"unit":[153],"minimal":[155],"impact":[156],"performance.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
