{"id":"https://openalex.org/W4407640240","doi":"https://doi.org/10.3390/computers14020071","title":"Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction","display_name":"Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction","publication_year":2025,"publication_date":"2025-02-16","ids":{"openalex":"https://openalex.org/W4407640240","doi":"https://doi.org/10.3390/computers14020071"},"language":"en","primary_location":{"id":"doi:10.3390/computers14020071","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14020071","pdf_url":"https://www.mdpi.com/2073-431X/14/2/71/pdf?version=1739695681","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/14/2/71/pdf?version=1739695681","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110956125","display_name":"Fahad Alqurashi","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Fahad Alqurashi","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115661291","display_name":"Mohammed AL-Hashimi","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Al-Hashimi","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088871928","display_name":"Mostafa Saleh","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mostafa Saleh","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009812781","display_name":"Osama Ahmed Abulnaja","orcid":"https://orcid.org/0000-0003-3431-6890"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Osama Abulnaja","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 25732, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110956125"],"corresponding_institution_ids":["https://openalex.org/I185163786"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.6995,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88961736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"14","issue":"2","first_page":"71","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8073731660842896},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.7191554307937622},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4846244752407074},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.42146626114845276},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38719263672828674},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32695144414901733},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21335569024085999},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.10152903199195862},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08387365937232971},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07620641589164734}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8073731660842896},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.7191554307937622},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4846244752407074},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.42146626114845276},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38719263672828674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32695144414901733},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21335569024085999},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.10152903199195862},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08387365937232971},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07620641589164734},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14020071","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14020071","pdf_url":"https://www.mdpi.com/2073-431X/14/2/71/pdf?version=1739695681","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d15679d2c0ee4d74a2aa549df816e21a","is_oa":true,"landing_page_url":"https://doaj.org/article/d15679d2c0ee4d74a2aa549df816e21a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 2, p 71 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14020071","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14020071","pdf_url":"https://www.mdpi.com/2073-431X/14/2/71/pdf?version=1739695681","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407640240.pdf","grobid_xml":"https://content.openalex.org/works/W4407640240.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1613874182","https://openalex.org/W1779923173","https://openalex.org/W2013319186","https://openalex.org/W2103289002","https://openalex.org/W2296391043","https://openalex.org/W2461570336","https://openalex.org/W2474699623","https://openalex.org/W2582675761","https://openalex.org/W2586555532","https://openalex.org/W2606774910","https://openalex.org/W2611887307","https://openalex.org/W2793320545","https://openalex.org/W2803376702","https://openalex.org/W2807403537","https://openalex.org/W2888798936","https://openalex.org/W2900479912","https://openalex.org/W2936165747","https://openalex.org/W2962986039","https://openalex.org/W2964281551","https://openalex.org/W2978325751","https://openalex.org/W2981343730","https://openalex.org/W2984643661","https://openalex.org/W2985509521","https://openalex.org/W3036557299","https://openalex.org/W3080411185","https://openalex.org/W3165595634","https://openalex.org/W4220832017","https://openalex.org/W4233119454","https://openalex.org/W4380272615","https://openalex.org/W6604021625","https://openalex.org/W6712330288","https://openalex.org/W6739916560"],"related_works":["https://openalex.org/W2061007994","https://openalex.org/W2408643487","https://openalex.org/W4256090683","https://openalex.org/W2145546531","https://openalex.org/W1586172811","https://openalex.org/W2159609636","https://openalex.org/W3196561854","https://openalex.org/W3028997697","https://openalex.org/W2583594538","https://openalex.org/W2131019288"],"abstract_inverted_index":{"Spectre":[0,45,86,135,175],"variants":[1],"1":[2],"and":[3,33,71,111,154,203,217],"2":[4],"pose":[5],"grave":[6],"security":[7,70,153,164,185],"threats":[8],"to":[9,30,65,95,146,150,196,213],"dynamic":[10],"branch":[11,121],"predictors":[12],"in":[13,131],"modern":[14],"CPUs.":[15],"While":[16],"extensive":[17],"research":[18],"has":[19,27],"focused":[20],"on":[21,108,163],"mitigating":[22],"these":[23],"attacks,":[24],"little":[25],"attention":[26],"been":[28],"given":[29],"their":[31],"energy":[32,49,54,103,171,201],"power":[34,72,117,155],"implications.":[35],"This":[36],"study":[37,206],"presents":[38],"an":[39,57],"empirical":[40],"analysis":[41],"of":[42,79,85,192],"how":[43],"compiler-based":[44],"mitigation":[46,194],"techniques":[47,195],"influence":[48],"consumption.":[50],"We":[51],"collect":[52],"fine-grained":[53],"readings":[55],"from":[56],"HPC-class":[58],"CPU":[59],"via":[60],"embedded":[61],"sensors,":[62],"allowing":[63],"us":[64],"quantify":[66],"the":[67,83,109,170,178,190],"trade-offs":[68],"between":[69],"efficiency.":[73,156],"By":[74],"utilizing":[75],"a":[76,96,129],"standard":[77],"suite":[78],"microbenchmarks,":[80],"we":[81],"evaluate":[82],"impact":[84],"mitigations":[87,136,176],"across":[88],"three":[89],"widely":[90],"used":[91],"compilers,":[92],"comparing":[93],"them":[94],"no-mitigation":[97],"baseline.":[98],"The":[99,205],"results":[100],"show":[101],"that":[102,160],"consumption":[104,118],"varies":[105],"significantly":[106],"depending":[107],"compiler":[110,179,211],"workload":[112],"characteristics.":[113],"Loop":[114],"unrolling":[115],"influences":[116],"by":[119],"altering":[120],"distribution,":[122],"while":[123],"speculative":[124,139],"execution,":[125,140],"when":[126],"unrestricted,":[127],"plays":[128],"role":[130],"conserving":[132],"energy.":[133],"Since":[134],"inherently":[137],"limit":[138],"they":[141],"should":[142],"be":[143],"applied":[144],"selectively":[145],"vulnerable":[147],"code":[148],"patterns":[149],"optimize":[151],"both":[152],"Unlike":[157],"previous":[158],"studies":[159],"primarily":[161],"focus":[162],"effectiveness,":[165],"this":[166],"work":[167],"uniquely":[168],"evaluates":[169],"costs":[172],"associated":[173],"with":[174],"at":[177],"level,":[180],"offering":[181],"insights":[182],"for":[183,210],"power-efficient":[184],"strategies.":[186],"Our":[187],"findings":[188],"underscore":[189],"importance":[191],"tailoring":[193],"application":[197],"needs,":[198],"balancing":[199],"performance,":[200],"consumption,":[202],"security.":[204],"provides":[207],"practical":[208],"recommendations":[209],"developers":[212],"build":[214],"more":[215],"secure":[216],"energy-efficient":[218],"software.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2025-10-10T00:00:00"}
