{"id":"https://openalex.org/W4288086178","doi":"https://doi.org/10.1145/3319535.3363194","title":"SMoTherSpectre","display_name":"SMoTherSpectre","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W4288086178","doi":"https://doi.org/10.1145/3319535.3363194"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3363194","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010558882","display_name":"Atri Bhattacharyya","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Atri Bhattacharyya","raw_affiliation_strings":["EPFL, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077103560","display_name":"Alexandra Sandulescu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Alexandra Sandulescu","raw_affiliation_strings":["IBM Research - Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063464936","display_name":"Matthias Neugschwandtner","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Matthias Neugschwandtner","raw_affiliation_strings":["IBM Research - Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009910864","display_name":"Alessandro Sorniotti","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Alessandro Sorniotti","raw_affiliation_strings":["IBM Research - Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057697787","display_name":"Babak Falsafi","orcid":"https://orcid.org/0000-0001-5916-8068"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Babak Falsafi","raw_affiliation_strings":["EPFL, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065116578","display_name":"Mathias Payer","orcid":"https://orcid.org/0000-0001-5054-7547"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["EPFL, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012013613","display_name":"Anil Kurmus","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Anil Kurmus","raw_affiliation_strings":["IBM Research - Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5010558882"],"corresponding_institution_ids":["https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":10.4174,"has_fulltext":false,"cited_by_count":153,"citation_normalized_percentile":{"value":0.98535896,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"785","last_page":"800"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8228404521942139},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5684146285057068},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5338581204414368},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5216037034988403},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5025784969329834},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4974518120288849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48141834139823914},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.48084840178489685},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43262019753456116},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4178796410560608},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3745967745780945},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.15389171242713928},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13150352239608765}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8228404521942139},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5684146285057068},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5338581204414368},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5216037034988403},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5025784969329834},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4974518120288849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48141834139823914},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.48084840178489685},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43262019753456116},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4178796410560608},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3745967745780945},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.15389171242713928},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13150352239608765},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3363194","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1486577490","https://openalex.org/W1488058190","https://openalex.org/W1964281299","https://openalex.org/W1992291252","https://openalex.org/W2109235078","https://openalex.org/W2350778671","https://openalex.org/W2664885055","https://openalex.org/W2884163605","https://openalex.org/W2891241286","https://openalex.org/W3103041597","https://openalex.org/W4242926647"],"related_works":["https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2098392677","https://openalex.org/W2103519941","https://openalex.org/W2362689357","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2043669269"],"abstract_inverted_index":{"Spectre,":[0],"Meltdown,":[1],"and":[2,13,110,154,179],"related":[3],"attacks":[4,54,141],"have":[5],"demonstrated":[6],"that":[7,36,68,93,114,130],"kernels,":[8],"hypervisors,":[9],"trusted":[10],"execution":[11],"environments,":[12],"browsers":[14],"are":[15,55],"prone":[16],"to":[17,28,50,80,134],"information":[18,82],"disclosure":[19],"through":[20,175],"micro-architectural":[21],"weaknesses.":[22],"However,":[23],"it":[24],"remains":[25,47],"unclear":[26,48],"as":[27,49,76],"what":[29,51],"extent":[30,52],"other":[31],"applications,":[32],"in":[33,71,117,177],"particular":[34],"those":[35],"do":[37],"not":[38],"load":[39],"attacker-provided":[40],"code,":[41],"may":[42],"be":[43,132],"impacted.":[44],"It":[45],"also":[46],"these":[53],"reliant":[56],"on":[57,97,123],"cache-based":[58],"side":[59,78,91],"channels.":[60],"We":[61],"introduce":[62],"SMoTherSpectre,":[63],"a":[64,77,84,89,98,108,112,170],"speculative":[65],"code-reuse":[66],"attack":[67],"leverages":[69],"port-contention":[70],"simultaneously":[72],"multi-threaded":[73],"processors":[74],"(SMoTher)":[75],"channel":[79,92],"leak":[81,135],"from":[83],"victim":[85,100],"process.":[86],"SMoTher":[87],"is":[88],"fine-grained":[90],"detects":[94],"contention":[95],"based":[96],"single":[99],"instruction.":[101],"To":[102],"discover":[103],"real-world":[104],"gadgets,":[105],"we":[106,125,138],"describe":[107],"methodology":[109],"build":[111],"tool":[113],"locates":[115],"SMoTher-gadgets":[116],"popular":[118],"libraries.":[119],"In":[120],"an":[121,156,165],"evaluation":[122],"glibc,":[124],"found":[126],"hundreds":[127],"of":[128,172],"gadgets":[129,176],"can":[131,168],"used":[133],"information.":[136],"Finally,":[137],"demonstrate":[139],"proof-of-concept":[140],"against":[142,155],"the":[143,161,173],"OpenSSH":[144],"server,":[145],"creating":[146,164],"oracles":[147],"for":[148],"determining":[149],"four":[150],"host":[151],"key":[152],"bits,":[153],"application":[157],"performing":[158],"encryption":[159],"using":[160],"OpenSSL":[162],"library,":[163],"oracle":[166],"which":[167],"differentiate":[169],"bit":[171],"plaintext":[174],"libcrypto":[178],"glibc.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":27},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":6}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2022-07-28T00:00:00"}
