{"id":"https://openalex.org/W4309073410","doi":"https://doi.org/10.1145/3566053","title":"SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V","display_name":"SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V","publication_year":2022,"publication_date":"2022-11-12","ids":{"openalex":"https://openalex.org/W4309073410","doi":"https://doi.org/10.1145/3566053"},"language":"en","primary_location":{"id":"doi:10.1145/3566053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566053","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566053","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3566053","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100702379","display_name":"Zhuo He","orcid":"https://orcid.org/0000-0003-3367-9702"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuo He","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103053061","display_name":"Weizhong Qiang","orcid":"https://orcid.org/0000-0003-4390-3819"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhong Qiang","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022262922"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":2.0823,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88988198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"20","issue":"1","first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8997350931167603},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.7558798789978027},{"id":"https://openalex.org/keywords/speculative-execution","display_name":"Speculative execution","score":0.731118381023407},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5365362763404846},{"id":"https://openalex.org/keywords/reduced-instruction-set-computing","display_name":"Reduced instruction set computing","score":0.48625266551971436},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4264606237411499},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.42558497190475464},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4162443280220032},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.41538557410240173},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.4106699824333191},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.3744770288467407},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2890356779098511},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.28775960206985474},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.237542986869812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15142688155174255},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13810834288597107},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1352519392967224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8997350931167603},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.7558798789978027},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.731118381023407},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5365362763404846},{"id":"https://openalex.org/C126298526","wikidata":"https://www.wikidata.org/wiki/Q189376","display_name":"Reduced instruction set computing","level":3,"score":0.48625266551971436},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4264606237411499},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.42558497190475464},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4162443280220032},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.41538557410240173},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.4106699824333191},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.3744770288467407},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2890356779098511},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.28775960206985474},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.237542986869812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15142688155174255},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13810834288597107},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1352519392967224},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3566053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566053","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566053","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3566053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566053","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566053","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1428435317","display_name":null,"funder_award_id":"Grant No.:","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6403253052","display_name":null,"funder_award_id":"GS501100001809","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8250236810","display_name":null,"funder_award_id":"62272181","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4309073410.pdf","grobid_xml":"https://content.openalex.org/works/W4309073410.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W14611369","https://openalex.org/W59787369","https://openalex.org/W2036853599","https://openalex.org/W2100666033","https://openalex.org/W2102089995","https://openalex.org/W2107691219","https://openalex.org/W2139588056","https://openalex.org/W2252814878","https://openalex.org/W2322411027","https://openalex.org/W2588464298","https://openalex.org/W2625110865","https://openalex.org/W2664885055","https://openalex.org/W2752918028","https://openalex.org/W2911910392","https://openalex.org/W2912797383","https://openalex.org/W2912893715","https://openalex.org/W2913208203","https://openalex.org/W2914982603","https://openalex.org/W2979547870","https://openalex.org/W2979633637","https://openalex.org/W2979849111","https://openalex.org/W3097783227","https://openalex.org/W3153564332","https://openalex.org/W3160448675","https://openalex.org/W3168527807","https://openalex.org/W3207150733","https://openalex.org/W4229571974","https://openalex.org/W4238194638","https://openalex.org/W4239342816","https://openalex.org/W4252033442","https://openalex.org/W4252481514","https://openalex.org/W6796327092","https://openalex.org/W6939703031"],"related_works":["https://openalex.org/W1569451733","https://openalex.org/W4247737992","https://openalex.org/W4283264211","https://openalex.org/W3112409568","https://openalex.org/W2987198418","https://openalex.org/W4364303238","https://openalex.org/W4380031408","https://openalex.org/W3193736325","https://openalex.org/W4367694480","https://openalex.org/W4309073410"],"abstract_inverted_index":{"In":[0,90,185],"modern":[1],"processors,":[2,11],"speculative":[3,17,31,51,87,94,114],"execution":[4,18,27,140,147],"has":[5,14],"significantly":[6],"improved":[7],"the":[8,25,40,49,55,71,101,109,113,132,139,192,205,224],"performance":[9,62,254,266],"of":[10,39,48,64,103,134,142,164,183,226,256,268],"but":[12,34],"it":[13],"also":[15],"introduced":[16],"vulnerabilities.":[19],"Recent":[20],"defenses":[21,43,189,199],"are":[22,116,159,173,180],"based":[23,75,99,190,203,246],"on":[24,76,100,191,204,210,236,247],"delayed":[26,146,174],"to":[28,45,66,129,138,167,187,219],"block":[29,46,84],"various":[30,231],"side":[32,52,88,95,250],"channels,":[33,53],"we":[35,195,228],"show":[36],"that":[37,79,170,179,215],"several":[38],"current":[41,56],"state-of-the-art":[42],"fail":[44],"some":[47],"available":[50],"and":[54,82,108,118,125,156,258],"most":[57],"secure":[58],"defense":[59,73],"introduces":[60],"a":[61,92,253,265],"overhead":[63,255,267],"up":[65],"24.5%.":[67],"We":[68],"propose":[69],"SpecTerminator,":[70,91,227],"first":[72],"framework":[74],"instruction":[77,126,166,207],"classes":[78],"can":[80],"comprehensively":[81],"precisely":[83,168],"all":[85,260],"existing":[86,232,261],"channels.":[89],"novel":[93],"channel":[96],"classification":[97],"scheme":[98],"features":[102],"secret":[104],"transmission":[105],"is":[106,216],"proposed,":[107],"sensitive":[110,165],"instructions":[111,172],"in":[112,176],"window":[115],"classified":[117],"identified":[119],"using":[120],"optimized":[121],"hardware":[122],"taint":[123],"tracking":[124],"masking":[127],"techniques":[128],"accurately":[130],"determine":[131],"scope":[133],"leakage.":[135,184],"Then,":[136],"according":[137],"characteristics":[141],"these":[143,171],"instructions,":[144],"dedicated":[145],"strategies,":[148],"such":[149],"as":[150],"TLB":[151],"request":[152],"ignoring,":[153],"selective":[154],"issue,":[155],"extended":[157],"delay-on-miss,":[158],"designed":[160],"for":[161],"each":[162],"type":[163],"control":[169],"only":[175],"pipeline":[177],"stages":[178],"at":[181],"risk":[182],"contrast":[186],"previous":[188],"Gem5":[193],"simulator,":[194],"have":[196,229],"innovatively":[197],"implemented":[198],"against":[200,243,259],"Spectre":[201,234,244,262],"attacks":[202,245,263],"open-source":[206],"set":[208],"RISC-V":[209],"an":[211],"FPGA-accelerated":[212],"simulation":[213],"platform":[214],"more":[217],"similar":[218],"real":[220],"hardware.":[221],"To":[222],"evaluate":[223],"security":[225],"replicated":[230],"x86-based":[233],"variants":[235],"RISC-V.":[237],"On":[238],"SPEC":[239],"2006,":[240],"SpecTerminator":[241],"defends":[242],"memory":[248],"hierarchy":[249],"channels":[251],"with":[252,264],"2.6%":[257],"6.0%.":[269]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
