{"id":"https://openalex.org/W4389476195","doi":"https://doi.org/10.1145/3613424.3623770","title":"ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage","display_name":"ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389476195","doi":"https://doi.org/10.1145/3613424.3623770"},"language":"en","primary_location":{"id":"doi:10.1145/3613424.3623770","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623770","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623770","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623770","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083504945","display_name":"Pavlos Aimoniotis","orcid":"https://orcid.org/0000-0001-6602-1988"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Pavlos Aimoniotis","raw_affiliation_strings":["Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087282518","display_name":"Amund Bergland Kvalsvik","orcid":"https://orcid.org/0009-0007-7112-865X"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Amund Bergland Kvalsvik","raw_affiliation_strings":["Norwegian University of Science and Technology, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081879456","display_name":"Xiaoyue Chen","orcid":"https://orcid.org/0000-0002-0727-3023"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Xiaoyue Chen","raw_affiliation_strings":["Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024358692","display_name":"Magnus Sj\u00e4lander","orcid":"https://orcid.org/0000-0003-4232-6976"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Magnus Sj\u00e4lander","raw_affiliation_strings":["Norwegian University of Science and Technology, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020214726","display_name":"Stefanos Kaxiras","orcid":"https://orcid.org/0000-0001-8267-0232"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefanos Kaxiras","raw_affiliation_strings":["Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083504945"],"corresponding_institution_ids":["https://openalex.org/I123387679"],"apc_list":null,"apc_paid":null,"fwci":1.0438,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81989361,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"828","last_page":"842"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7647198438644409},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.7500158548355103},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6761696338653564},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5463956594467163},{"id":"https://openalex.org/keywords/parallelism","display_name":"Parallelism (grammar)","score":0.5201042890548706},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.49706676602363586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4590330421924591},{"id":"https://openalex.org/keywords/speculative-execution","display_name":"Speculative execution","score":0.42748820781707764},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42508959770202637},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3665485382080078},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35919225215911865},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.349185049533844},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24117684364318848}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7647198438644409},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.7500158548355103},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6761696338653564},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5463956594467163},{"id":"https://openalex.org/C2781172179","wikidata":"https://www.wikidata.org/wiki/Q853109","display_name":"Parallelism (grammar)","level":2,"score":0.5201042890548706},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.49706676602363586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4590330421924591},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.42748820781707764},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42508959770202637},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3665485382080078},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35919225215911865},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.349185049533844},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24117684364318848},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3613424.3623770","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623770","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623770","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:uu-525488","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-525488","pdf_url":"https://uu.diva-portal.org/smash/get/diva2:1846648/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3613424.3623770","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623770","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623770","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2197756838","display_name":null,"funder_award_id":"2022-06725","funder_id":"https://openalex.org/F4320321030","funder_display_name":"VINNOVA"},{"id":"https://openalex.org/G3165808449","display_name":null,"funder_award_id":"022-06725","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G4310120812","display_name":null,"funder_award_id":"2021-020","funder_id":"https://openalex.org/F4320308943","funder_display_name":"Microsoft Research"},{"id":"https://openalex.org/G4493597635","display_name":null,"funder_award_id":"NAISS","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G5638537008","display_name":null,"funder_award_id":"VINNOVA","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G7104010596","display_name":null,"funder_award_id":"FUS21-0067","funder_id":"https://openalex.org/F4320320940","funder_display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning"},{"id":"https://openalex.org/G712881263","display_name":null,"funder_award_id":"2018-","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G7435060098","display_name":null,"funder_award_id":"2018-05254","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G8338695050","display_name":null,"funder_award_id":"2022-0672","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G8576755144","display_name":null,"funder_award_id":"021-02422","funder_id":"https://openalex.org/F4320321030","funder_display_name":"VINNOVA"},{"id":"https://openalex.org/G8869864247","display_name":null,"funder_award_id":"2022-06725","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"}],"funders":[{"id":"https://openalex.org/F4320308943","display_name":"Microsoft Research","ror":"https://ror.org/00d0nc645"},{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320321030","display_name":"VINNOVA","ror":"https://ror.org/01kd5m353"},{"id":"https://openalex.org/F4320322581","display_name":"Vetenskapsr\u00e5det","ror":"https://ror.org/03zttf063"},{"id":"https://openalex.org/F4320336376","display_name":"Uppsala Multidisciplinary Center for Advanced Computational Science","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389476195.pdf","grobid_xml":"https://content.openalex.org/works/W4389476195.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W2033797066","https://openalex.org/W2085773946","https://openalex.org/W2120230074","https://openalex.org/W2147657366","https://openalex.org/W2153456949","https://openalex.org/W2157225945","https://openalex.org/W2169875292","https://openalex.org/W2884163605","https://openalex.org/W2903910116","https://openalex.org/W2931030580","https://openalex.org/W2933306136","https://openalex.org/W2944616073","https://openalex.org/W2952322674","https://openalex.org/W2963311060","https://openalex.org/W2978325751","https://openalex.org/W2979633637","https://openalex.org/W2979849111","https://openalex.org/W2989861912","https://openalex.org/W3043595391","https://openalex.org/W3045536646","https://openalex.org/W3091516220","https://openalex.org/W3101300690","https://openalex.org/W3104572536","https://openalex.org/W3153564332","https://openalex.org/W3159033757","https://openalex.org/W3190597741","https://openalex.org/W3199976353","https://openalex.org/W3207150733","https://openalex.org/W3210302253","https://openalex.org/W4212837101","https://openalex.org/W4214931895","https://openalex.org/W4232120412","https://openalex.org/W4244227015","https://openalex.org/W4252481514","https://openalex.org/W4253039446","https://openalex.org/W4254771290","https://openalex.org/W4280523221","https://openalex.org/W4281779787","https://openalex.org/W4288057698","https://openalex.org/W4288086178","https://openalex.org/W4296959850","https://openalex.org/W4307473701","https://openalex.org/W4312327281","https://openalex.org/W4318241907","https://openalex.org/W4380881135","https://openalex.org/W4385080289"],"related_works":["https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2969678054","https://openalex.org/W2769734684","https://openalex.org/W2352435628","https://openalex.org/W2903787673","https://openalex.org/W2777343049"],"abstract_inverted_index":{"In":[0],"a":[1,5,17,61],"speculative":[2,56],"side-channel":[3],"attack,":[4],"secret":[6,32],"is":[7],"improperly":[8],"accessed":[9],"and":[10,66],"then":[11],"leaked":[12],"by":[13,28,39],"passing":[14],"it":[15],"to":[16],"transmitter":[18],"instruction.":[19],"Several":[20],"proposed":[21],"defenses":[22],"effectively":[23],"close":[24],"this":[25],"security":[26],"hole":[27],"either":[29],"delaying":[30,40],"the":[31],"from":[33,45,53],"being":[34],"loaded":[35],"or":[36,38],"propagated,":[37],"dependent":[41],"transmitters":[42],"(e.g.,":[43],"loads)":[44],"executing":[46],"when":[47],"fed":[48],"with":[49],"tainted":[50],"input":[51],"derived":[52],"an":[54],"earlier":[55],"load.":[57],"This":[58],"results":[59],"in":[60],"loss":[62],"of":[63],"memory-level":[64],"parallelism":[65],"performance.":[67]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
