{"id":"https://openalex.org/W3036557299","doi":"https://doi.org/10.1145/3399742","title":"Spectre attacks","display_name":"Spectre attacks","publication_year":2020,"publication_date":"2020-06-18","ids":{"openalex":"https://openalex.org/W3036557299","doi":"https://doi.org/10.1145/3399742","mag":"3036557299"},"language":"en","primary_location":{"id":"doi:10.1145/3399742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3399742","pdf_url":null,"source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038006957","display_name":"Paul Kocher","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Paul Kocher","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078931995","display_name":"Jann Horn","orcid":null},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jann Horn","raw_affiliation_strings":["Google Project Zero"],"affiliations":[{"raw_affiliation_string":"Google Project Zero","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041121396","display_name":"Anders Fogh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anders Fogh","raw_affiliation_strings":["G DATA Advanced Analytics"],"affiliations":[{"raw_affiliation_string":"G DATA Advanced Analytics","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029386182","display_name":"Daniel Genkin","orcid":"https://orcid.org/0000-0003-2720-9288"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Genkin","raw_affiliation_strings":["University of Michigan"],"affiliations":[{"raw_affiliation_string":"University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066874310","display_name":"Daniel Gruss","orcid":"https://orcid.org/0000-0002-7977-3246"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Gruss","raw_affiliation_strings":["Graz University of Technology"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113932852","display_name":"Werner Haas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Werner Haas","raw_affiliation_strings":["Cyberus Technology"],"affiliations":[{"raw_affiliation_string":"Cyberus Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001389927","display_name":"Mike Hamburg","orcid":null},"institutions":[{"id":"https://openalex.org/I1339014352","display_name":"Rambus (United Kingdom)","ror":"https://ror.org/04z6j1174","country_code":"GB","type":"company","lineage":["https://openalex.org/I1339014352","https://openalex.org/I4210095722"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mike Hamburg","raw_affiliation_strings":["Rambus, Cryptography Research Division"],"affiliations":[{"raw_affiliation_string":"Rambus, Cryptography Research Division","institution_ids":["https://openalex.org/I1339014352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056935116","display_name":"Moritz Lipp","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Moritz Lipp","raw_affiliation_strings":["Graz University of Technology"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015437576","display_name":"Stefan Mangard","orcid":"https://orcid.org/0000-0001-9650-8041"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stefan Mangard","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051348245","display_name":"Thomas Prescher","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Prescher","raw_affiliation_strings":["Cyberus Technology"],"affiliations":[{"raw_affiliation_string":"Cyberus Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070469078","display_name":"Michael Schwarz","orcid":"https://orcid.org/0000-0001-6744-3410"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Schwarz","raw_affiliation_strings":["Graz University of Technology"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056484605","display_name":"Yuval Yarom","orcid":"https://orcid.org/0000-0003-0401-4197"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuval Yarom","raw_affiliation_strings":["University of Adelaide and Data61"],"affiliations":[{"raw_affiliation_string":"University of Adelaide and Data61","institution_ids":["https://openalex.org/I5681781","https://openalex.org/I42894916"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":12,"corresponding_author_ids":["https://openalex.org/A5038006957"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":10.4658,"has_fulltext":false,"cited_by_count":233,"citation_normalized_percentile":{"value":0.98625721,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"63","issue":"7","first_page":"93","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8606135845184326},{"id":"https://openalex.org/keywords/speculative-execution","display_name":"Speculative execution","score":0.7396506071090698},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5708119869232178},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5704364776611328},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5075103640556335},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4842676520347595},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.4622364640235901},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4404789209365845},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4358386695384979},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.4312957525253296},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.411365807056427},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.41131845116615295},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4103925824165344},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3799048662185669},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.317277729511261},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.27635934948921204}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8606135845184326},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.7396506071090698},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5708119869232178},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5704364776611328},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5075103640556335},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4842676520347595},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.4622364640235901},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4404789209365845},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4358386695384979},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.4312957525253296},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.411365807056427},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.41131845116615295},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4103925824165344},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3799048662185669},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.317277729511261},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.27635934948921204}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3399742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3399742","pdf_url":null,"source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1503814339","https://openalex.org/W1613874182","https://openalex.org/W1934458198","https://openalex.org/W2061354941","https://openalex.org/W2126132644","https://openalex.org/W2131019288","https://openalex.org/W2138381338","https://openalex.org/W2154909745","https://openalex.org/W2157116240","https://openalex.org/W2162800072","https://openalex.org/W2172060328","https://openalex.org/W2562036180","https://openalex.org/W2750990141","https://openalex.org/W2775990858","https://openalex.org/W2883613460","https://openalex.org/W2964206587","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2117888911","https://openalex.org/W2139338109","https://openalex.org/W4389162411","https://openalex.org/W2434762079","https://openalex.org/W365166040","https://openalex.org/W3028997697","https://openalex.org/W2583594538","https://openalex.org/W2131019288","https://openalex.org/W3210462562","https://openalex.org/W4294002679"],"abstract_inverted_index":{"Modern":[0],"processors":[1],"use":[2],"branch":[3,18],"prediction":[4],"and":[5,39,72,74,100,127,167,172,196,235],"speculative":[6,57,145,186],"execution":[7,99,146,187],"to":[8,35,41,88,111,169,181,219,226,231,242,253],"maximize":[9],"performance.":[10],"For":[11],"example,":[12],"if":[13],"the":[14,27,37,45,50,56,69,103,112,136,141,149],"destination":[15,38],"of":[16,29,203],"a":[17,21,86,108,178,238],"depends":[19],"on":[20],"memory":[22,46,71,134],"value":[23,47],"that":[24,92,119,130,144,198],"is":[25,61],"in":[26,63,191,201,211],"process":[28,161],"being":[30],"read,":[31],"CPUs":[32],"will":[33,216],"try":[34],"guess":[36],"attempt":[40],"execute":[42],"ahead.":[43],"When":[44],"finally":[48],"arrives,":[49],"CPU":[51,246],"either":[52],"discards":[53],"or":[54],"commits":[55],"computation.":[58],"Speculative":[59],"logic":[60],"unfaithful":[62],"how":[64],"it":[65],"executes,":[66],"can":[67,75,131],"access":[68],"victim's":[70,104,137],"registers,":[73],"perform":[76,90],"operations":[77,91],"with":[78],"measurable":[79],"side":[80,109],"effects.":[81],"Spectre":[82],"attacks":[83,118,176],"involve":[84],"inducing":[85],"victim":[87],"speculatively":[89],"would":[93],"not":[94],"occur":[95],"during":[96],"correct":[97],"program":[98],"which":[101],"leak":[102],"confidential":[105],"information":[106],"via":[107],"channel":[110],"adversary.":[113],"This":[114],"paper":[115,142],"describes":[116],"practical":[117],"combine":[120],"methodology":[121],"from":[122,135,193],"side-channel":[123,173],"attacks,":[124,126],"fault":[125],"return-oriented":[128],"programming":[129],"read":[132],"arbitrary":[133],"process.":[138],"More":[139],"broadly,":[140],"shows":[143],"implementations":[147,247],"violate":[148],"security":[150,155],"assumptions":[151],"underpinning":[152],"numerous":[153],"software":[154,236],"mechanisms,":[156],"such":[157],"as":[158,222,224,241],"operating":[159],"system":[160],"separation,":[162],"containerization,":[163],"just-in-time":[164],"(JIT)":[165],"compilation,":[166],"countermeasures":[168,208],"cache":[170],"timing":[171],"attacks.":[174],"These":[175],"represent":[177],"serious":[179],"threat":[180],"actual":[182],"systems":[183],"because":[184],"vulnerable":[185],"capabilities":[188],"are":[189,199,209,248,250],"found":[190],"microprocessors":[192],"Intel,":[194],"AMD,":[195],"ARM":[197],"used":[200],"billions":[202],"devices.":[204],"Although":[205],"makeshift":[206],"processor-specific":[207],"possible":[210],"some":[212],"cases,":[213],"sound":[214],"solutions":[215],"require":[217],"fixes":[218],"processor":[220],"designs":[221],"well":[223],"updates":[225],"instruction":[227],"set":[228],"architectures":[229],"(ISAs)":[230],"give":[232],"hardware":[233],"architects":[234],"developers":[237],"common":[239],"understanding":[240],"what":[243],"computation":[244],"state":[245],"(and":[249],"not)":[251],"permitted":[252],"leak.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":15},{"year":2025,"cited_by_count":76},{"year":2024,"cited_by_count":62},{"year":2023,"cited_by_count":44},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2020-06-25T00:00:00"}
