{"id":"https://openalex.org/W4220868017","doi":"https://doi.org/10.1145/3514105.3514112","title":"An Evaluation of Meltdown Vulnerability","display_name":"An Evaluation of Meltdown Vulnerability","publication_year":2022,"publication_date":"2022-01-11","ids":{"openalex":"https://openalex.org/W4220868017","doi":"https://doi.org/10.1145/3514105.3514112"},"language":"en","primary_location":{"id":"doi:10.1145/3514105.3514112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3514105.3514112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th international Conference on Wireless Communication and Sensor Networks (ICWCSN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019210615","display_name":"Mateusz Nosek","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125529","display_name":"National Institute of Telecommunications","ror":"https://ror.org/03053v606","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210125529"]},{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Mateusz Nosek","raw_affiliation_strings":["Institute of Telecommunications, Warsaw University of Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Telecommunications, Warsaw University of Technology, Poland","institution_ids":["https://openalex.org/I4210125529","https://openalex.org/I108403487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009166088","display_name":"Krzysztof Szczypiorski","orcid":"https://orcid.org/0000-0001-8638-8584"},"institutions":[{"id":"https://openalex.org/I4210125529","display_name":"National Institute of Telecommunications","ror":"https://ror.org/03053v606","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210125529"]},{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Krzysztof Szczypiorski","raw_affiliation_strings":["Institute of Telecommunications, Warsaw University of Technology, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Telecommunications, Warsaw University of Technology, Poland","institution_ids":["https://openalex.org/I4210125529","https://openalex.org/I108403487"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019210615"],"corresponding_institution_ids":["https://openalex.org/I108403487","https://openalex.org/I4210125529"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0213074,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9164999723434448,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7590422630310059},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7508841753005981},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5446847677230835},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.49685028195381165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4459032118320465},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16147279739379883}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7590422630310059},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7508841753005981},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5446847677230835},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.49685028195381165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4459032118320465},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16147279739379883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3514105.3514112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3514105.3514112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th international Conference on Wireless Communication and Sensor Networks (ICWCSN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1510808677","https://openalex.org/W3029114445"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"These":[0,68],"days":[1],"processors":[2,109],"are":[3,45,70,167],"becoming":[4],"faster":[5,43],"and":[6,44,79,115,134],"faster.":[7],"This":[8,144],"translates":[9],"indirectly":[10],"into":[11],"a":[12,23,158],"significant":[13],"improvement":[14],"in":[15,59,82,106,122],"the":[16,33,55,62,65,74,125,142],"quality":[17],"of":[18,35,64,76,86,129,149],"life.":[19],"However,":[20],"there":[21],"is":[22,30,140,156],"price":[24],"to":[25,40,52,89,136,160,169],"be":[26,98],"paid;":[27],"this":[28,139],"evolution":[29],"associated":[31,72],"with":[32,73],"emergence":[34],"many":[36,92,128,137],"threats,":[37],"which":[38,102,116],"seem":[39],"develop":[41],"even":[42],"often":[46],"not":[47,111],"realized":[48],"by":[49],"professionals.":[50],"Striving":[51],"maximally":[53],"increase":[54],"computational":[56],"power":[57],"resulted":[58],"vulnerabilities":[60,69,100,132,165],"on":[61],"level":[63],"very":[66],"processors.":[67,84],"mostly":[71],"mechanisms":[75],"speculative":[77],"execution":[78],"cache":[80],"use":[81],"modern":[83],"Some":[85],"them":[87],"came":[88],"light":[90],"after":[91],"years.":[93],"An":[94],"example":[95],"here":[96],"might":[97],"Spectre":[99,150],"class":[101],"has":[103],"been":[104],"found":[105],"most":[107],"Intel's":[108],"(and":[110],"only)":[112],"from":[113],"2006":[114],"was":[117],"disclosed":[118],"as":[119,121],"late":[120],"2017.":[123],"In":[124],"recent":[126],"years":[127],"such":[130],"security":[131],"arose":[133],"according":[135],"experts":[138],"just":[141,157],"beginning.":[143],"article":[145],"presents":[146],"our":[147],"evaluation":[148],"version":[151],"3":[152],"(Meltdown)":[153],"vulnerability.":[154],"It":[155],"prelude":[159],"further":[161],"research":[162],"regarding":[163],"low-level":[164],"we":[166],"going":[168],"pursue.":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
