{"id":"https://openalex.org/W3036976936","doi":"https://doi.org/10.23919/date48585.2020.9116402","title":"GhostBusters: Mitigating Spectre Attacks on a DBT-Based Processor","display_name":"GhostBusters: Mitigating Spectre Attacks on a DBT-Based Processor","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3036976936","doi":"https://doi.org/10.23919/date48585.2020.9116402","mag":"3036976936"},"language":"en","primary_location":{"id":"doi:10.23919/date48585.2020.9116402","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012750585","display_name":"Simon Rokicki","orcid":"https://orcid.org/0000-0002-0195-096X"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Simon Rokicki","raw_affiliation_strings":["Univ Rennes,INRIA, CNRS, IRISA","INRIA, CNRS, IRISA, Univ Rennes"],"affiliations":[{"raw_affiliation_string":"Univ Rennes,INRIA, CNRS, IRISA","institution_ids":["https://openalex.org/I2802519937","https://openalex.org/I56067802","https://openalex.org/I1326498283","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"INRIA, CNRS, IRISA, Univ Rennes","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I2802519937","https://openalex.org/I56067802","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012750585"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I2802519937","https://openalex.org/I1294671590","https://openalex.org/I56067802"],"apc_list":null,"apc_paid":null,"fwci":0.14685955,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53040719,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"927","last_page":"932"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8357275128364563},{"id":"https://openalex.org/keywords/binary-translation","display_name":"Binary translation","score":0.6760313510894775},{"id":"https://openalex.org/keywords/speculative-execution","display_name":"Speculative execution","score":0.6475609540939331},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.5937567353248596},{"id":"https://openalex.org/keywords/very-long-instruction-word","display_name":"Very long instruction word","score":0.5869180560112},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.583267331123352},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5578452944755554},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5355050563812256},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.5181840062141418},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5045355558395386},{"id":"https://openalex.org/keywords/software-pipelining","display_name":"Software pipelining","score":0.4788065552711487},{"id":"https://openalex.org/keywords/out-of-order-execution","display_name":"Out-of-order execution","score":0.468605637550354},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4430113434791565},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.43956080079078674},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4241105616092682},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.37722718715667725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.29492542147636414},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17928415536880493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09579071402549744}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357275128364563},{"id":"https://openalex.org/C2778971978","wikidata":"https://www.wikidata.org/wiki/Q2287075","display_name":"Binary translation","level":3,"score":0.6760313510894775},{"id":"https://openalex.org/C141331961","wikidata":"https://www.wikidata.org/wiki/Q2164465","display_name":"Speculative execution","level":2,"score":0.6475609540939331},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.5937567353248596},{"id":"https://openalex.org/C170595534","wikidata":"https://www.wikidata.org/wiki/Q249743","display_name":"Very long instruction word","level":2,"score":0.5869180560112},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.583267331123352},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5578452944755554},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5355050563812256},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.5181840062141418},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5045355558395386},{"id":"https://openalex.org/C188854837","wikidata":"https://www.wikidata.org/wiki/Q268469","display_name":"Software pipelining","level":3,"score":0.4788065552711487},{"id":"https://openalex.org/C1793878","wikidata":"https://www.wikidata.org/wiki/Q1153762","display_name":"Out-of-order execution","level":2,"score":0.468605637550354},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4430113434791565},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.43956080079078674},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4241105616092682},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.37722718715667725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29492542147636414},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17928415536880493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09579071402549744}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date48585.2020.9116402","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2036162899","https://openalex.org/W2079530268","https://openalex.org/W2107782879","https://openalex.org/W2148865465","https://openalex.org/W2163681909","https://openalex.org/W2868863044","https://openalex.org/W2884530475","https://openalex.org/W2887727828","https://openalex.org/W2912742709","https://openalex.org/W2920016180","https://openalex.org/W2933144558","https://openalex.org/W2963311060","https://openalex.org/W2963739369","https://openalex.org/W3015465581","https://openalex.org/W4241410512","https://openalex.org/W4246403730","https://openalex.org/W4289105799","https://openalex.org/W6747544890","https://openalex.org/W6753251892","https://openalex.org/W6754468926","https://openalex.org/W6756645753","https://openalex.org/W6758414631","https://openalex.org/W6760517015","https://openalex.org/W7070539902"],"related_works":["https://openalex.org/W2303048830","https://openalex.org/W2124831322","https://openalex.org/W4232953398","https://openalex.org/W4232919122","https://openalex.org/W2510534818","https://openalex.org/W1990058210","https://openalex.org/W3143608323","https://openalex.org/W2334517886","https://openalex.org/W2515308961","https://openalex.org/W2161931362"],"abstract_inverted_index":{"Unveiled":[0],"early":[1],"2018,":[2],"the":[3,9,16,32,39,44,58,108,121,155,170,181],"Spectre":[4,13,151],"vulnerability":[5],"affects":[6],"most":[7],"of":[8,30,36,56,74,104,124,154],"modern":[10],"high-performance":[11],"processors.":[12],"variants":[14],"exploit":[15],"speculative":[17],"execution":[18],"mechanisms":[19],"and":[20,90,106,176],"a":[21,53,83,91,96],"cache":[22],"side-channel":[23],"attack":[24],"to":[25,150],"leak":[26],"secret":[27],"data.":[28],"As":[29],"today,":[31],"main":[33],"countermeasures":[34],"consist":[35],"turning":[37],"off":[38],"speculation,":[40],"which":[41],"drastically":[42],"reduces":[43],"processor":[45],"performance.":[46],"In":[47,131],"this":[48,132],"work,":[49],"we":[50,134,159],"focus":[51],"on":[52],"different":[54],"kind":[55],"micro-architecture:":[57],"DBT":[59,100,116,156,171],"based":[60,117],"processors,":[61],"such":[62],"as":[63,169],"Transmeta":[64],"Crusoe":[65],"[1],":[66],"NVidia":[67],"Denver":[68],"[2],":[69],"or":[70],"Hybrid-DBT":[71],"[3].":[72],"Instead":[73],"using":[75],"complex":[76],"outof-order":[77],"(OoO)":[78],"mechanisms,":[79],"those":[80,139,163],"cores":[81,126],"combines":[82],"software":[84,175],"Dynamic":[85],"Binary":[86],"Translation":[87],"mechanism":[88],"(DBT)":[89],"parallel":[92],"in-order":[93],"architecture,":[94],"typically":[95],"VLIW":[97],"core.":[98],"The":[99],"is":[101,172],"in":[102,174],"charge":[103],"translating":[105],"optimizing":[107],"binaries":[109],"before":[110],"their":[111],"execution.":[112],"Studies":[113],"show":[114],"that":[115,162],"processors":[118,140],"can":[119,165],"reach":[120],"performance":[122],"level":[123],"OoO":[125,144],"for":[127],"regular":[128],"enough":[129],"applications.":[130],"paper,":[133],"demonstrate":[135,161],"that,":[136],"even":[137],"if":[138],"do":[141],"not":[142],"use":[143],"execution,":[145],"they":[146],"are":[147],"still":[148],"vulnerable":[149],"variants,":[152],"because":[153],"optimizations.":[157],"However,":[158],"also":[160],"systems":[164],"easily":[166],"be":[167],"patched,":[168],"done":[173],"has":[177],"fine-grained":[178],"control":[179],"over":[180],"optimization":[182],"process.":[183]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
