{"id":"https://openalex.org/W3045655459","doi":"https://doi.org/10.1145/3434330","title":"Automatically eliminating speculative leaks from cryptographic code with blade","display_name":"Automatically eliminating speculative leaks from cryptographic code with blade","publication_year":2021,"publication_date":"2021-01-04","ids":{"openalex":"https://openalex.org/W3045655459","doi":"https://doi.org/10.1145/3434330","mag":"3045655459"},"language":"en","primary_location":{"id":"doi:10.1145/3434330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3434330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3434330","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3434330","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Marco Vassena","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Marco Vassena","raw_affiliation_strings":["CISPA, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CISPA, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Craig Disselkoen","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Craig Disselkoen","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Klaus von Gleissenthall","orcid":null},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Klaus von Gleissenthall","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sunjay Cauligi","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sunjay Cauligi","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rami G\u00f6khan K\u0131c\u0131","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rami G\u00f6khan K\u0131c\u0131","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ranjit Jhala","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ranjit Jhala","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dean Tullsen","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dean Tullsen","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":null,"display_name":"Deian Stefan","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deian Stefan","raw_affiliation_strings":["University of California at San Diego, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California at San Diego, USA","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":4.8974,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.95780428,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"5","issue":"POPL","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5806000232696533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5806000232696533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.15649999678134918,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.13989999890327454,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/speculation","display_name":"Speculation","score":0.7617999911308289},{"id":"https://openalex.org/keywords/speculative-multithreading","display_name":"Speculative multithreading","score":0.6079999804496765},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5475000143051147},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5382999777793884},{"id":"https://openalex.org/keywords/speculative-execution","display_name":"Speculative execution","score":0.5357000231742859},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4788999855518341},{"id":"https://openalex.org/keywords/dataflow","display_name":"Dataflow","score":0.4666000008583069},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4083999991416931}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925000190734863},{"id":"https://openalex.org/C47941915","wikidata":"https://www.wikidata.org/wiki/Q107885","display_name":"Speculation","level":2,"score":0.7617999911308289},{"id":"https://openalex.org/C15296174","wikidata":"https://www.wikidata.org/wiki/Q7575343","display_name":"Speculative multithreading","level":4,"score":0.6079999804496765},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5475000143051147},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5382999777793884},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.5357000231742859},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4788999855518341},{"id":"https://openalex.org/C96324660","wikidata":"https://www.wikidata.org/wiki/Q205446","display_name":"Dataflow","level":2,"score":0.4666000008583069},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4083999991416931},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3862000107765198},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.31279999017715454},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.30239999294281006},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.29030001163482666},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2777000069618225},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C2778485113","wikidata":"https://www.wikidata.org/wiki/Q193231","display_name":"Debugger","level":3,"score":0.26739999651908875},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.2567000091075897}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3434330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3434330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3434330","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/ab6e1ed4-2c85-492c-8cff-d5d6206bb22f","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/ab6e1ed4-2c85-492c-8cff-d5d6206bb22f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Vassena, M, Disselkoen, C, von Gleissenthall, K, Cauligi, S, Klcl, R G, Jhala, R, Tullsen, D & Stefan, D 2021, 'Automatically eliminating speculative leaks from cryptographic code with blade', Proceedings of the ACM on Programming Languages, vol. 5, no. POPL, 49, pp. 1-30. https://doi.org/10.1145/3434330","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arXiv.org:2005.00294","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.00294","pdf_url":"https://arxiv.org/pdf/2005.00294","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:research.vu.nl:openaire/ab6e1ed4-2c85-492c-8cff-d5d6206bb22f","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/ab6e1ed4-2c85-492c-8cff-d5d6206bb22f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Vassena, M, Disselkoen, C, von Gleissenthall, K, Cauligi, S, Klcl, R G, Jhala, R, Tullsen, D & Stefan, D 2021, 'Automatically eliminating speculative leaks from cryptographic code with blade', Proceedings of the ACM on Programming Languages, vol. 5, no. POPL, 49, pp. 1-30. https://doi.org/10.1145/3434330","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3434330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3434330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3434330","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2628043840","display_name":"FMitF: Collaborative Research: Track I: Finding and Eliminating Bugs in Operating Systems","funder_award_id":"1918573","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3291780239","display_name":null,"funder_award_id":"CNS-1514435","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4818589963","display_name":"TWC: Medium: Detection and Prevention of Data Timing Channels","funder_award_id":"1514435","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4970457988","display_name":null,"funder_award_id":"N000141512750","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G6552516729","display_name":null,"funder_award_id":"CCF-1918573","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"},{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3045655459.pdf","grobid_xml":"https://content.openalex.org/works/W3045655459.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W2103289002","https://openalex.org/W2115270921","https://openalex.org/W2155851497","https://openalex.org/W2766545755","https://openalex.org/W2767162229","https://openalex.org/W2884163605","https://openalex.org/W2885285030","https://openalex.org/W2903910116","https://openalex.org/W2926494289","https://openalex.org/W2931030580","https://openalex.org/W2962722502","https://openalex.org/W2997271062","https://openalex.org/W3008383151","https://openalex.org/W3015844221","https://openalex.org/W3048901311","https://openalex.org/W4230988461","https://openalex.org/W4232120412"],"related_works":[],"abstract_inverted_index":{"We":[0,60,116,145,168],"introduce":[1,39],"Blade,":[2],"a":[3,65,104,134],"new":[4,105],"approach":[5,156],"to":[6,23,31,44,110,140,191],"automatically":[7,132,180],"and":[8,88,118,125,153,185],"efficiently":[9,186],"eliminate":[10,142],"speculative":[11,27,81,91,143],"leaks":[12,25,92],"from":[13,35],"cryptographic":[14,166],"code.":[15],"Blade":[16,101,147,171],"is":[17],"built":[18],"on":[19,103],"the":[20,33,50,149],"insight":[21,63],"that":[22,37,46,69,95,170,176],"stop":[24],"via":[26,178],"execution,":[28],"it":[29],"suffices":[30],"cut":[32],"dataflow":[34],"expressions":[36,98],"speculatively":[38],"secrets":[40,82],"(":[41,52],"sources":[42],")":[43],"those":[45],"leak":[47,177],"them":[48],"through":[49],"cache":[51],"sinks":[53],"),":[54],"rather":[55],"than":[56],"prohibit":[57],"speculation":[58,112,179],"altogether.":[59],"formalize":[61,117],"this":[62],"in":[64,148],"static":[66],"type":[67,129],"system":[68,130],"(1)":[70],"types":[71],"each":[72],"expression":[73],"as":[74,84],"either":[75],"transient":[76],",":[77,87,109,181],"i.e.,":[78],"possibly":[79],"containing":[80],"or":[83],"being":[85],"stable":[86],"(2)":[89],"prohibits":[90],"by":[93,157],"requiring":[94],"all":[96],"sink":[97],"are":[99],"stable.":[100],"relies":[102],"abstract":[106],"primitive,":[107],"protect":[108,120,138,193],"halt":[111],"at":[113],"fine":[114],"granularity.":[115],"implement":[119,146,192],"using":[121,189],"existing":[122,174],"architectural":[123],"mechanisms,":[124],"show":[126],"how":[127],"Blade\u2019s":[128],"can":[131,172],"synthesize":[133],"minimal":[135],"number":[136],"of":[137,165],"s":[139],"provably":[141],"leaks.":[144],"Cranelift":[150],"WebAssembly":[151,163],"compiler":[152],"evaluate":[154],"our":[155],"repairing":[158],"several":[159],"verified,":[160],"yet":[161],"vulnerable":[162],"implementations":[164],"primitives.":[167],"find":[169],"fix":[173],"programs":[175],"without":[182],"user":[183],"intervention,":[184],"even":[187],"when":[188],"fences":[190],".":[194]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2020-08-03T00:00:00"}
