SafeBet: Secure, Simple, and Fast Speculative Execution Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2306.07785
Spectre attacks exploit microprocessor speculative execution to read and transmit forbidden data outside the attacker's trust domain and sandbox. Recent hardware schemes allow potentially-unsafe speculative accesses but prevent the secret's transmission by delaying most access-dependent instructions even in the predominantly-common, no-attack case, which incurs performance loss and hardware complexity. Instead, we propose SafeBet which allows only, and does not delay most, safe accesses, achieving both security and high performance. SafeBet is based on the key observation that speculatively accessing a destination location is safe if the location's access by the same static trust domain has been committed previously; and potentially unsafe, otherwise. We extend this observation to handle inter trust-domain code and data interactions. SafeBet employs the Speculative Memory Access Control Table (SMACT) to track non-speculative trust domain code region-destination pairs. Disallowed accesses wait until reaching commit to trigger well-known replay, with virtually no change to the pipeline. Software simulations using SpecCPU benchmarks show that SafeBet uses an 8.3-KB SMACT per core to perform within 6% on average (63% at worst) of the unsafe baseline behind which NDA-restrictive, a previous scheme of security and hardware complexity comparable to SafeBet's, lags by 83% on average.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2306.07785
- https://arxiv.org/pdf/2306.07785
- OA Status
- green
- Cited By
- 1
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4380715254
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4380715254Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2306.07785Digital Object Identifier
- Title
-
SafeBet: Secure, Simple, and Fast Speculative ExecutionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-06-13Full publication date if available
- Authors
-
Conor James Green, Cole Nelson, Mithuna Thottethodi, T. N. VijaykumarList of authors in order
- Landing page
-
https://arxiv.org/abs/2306.07785Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2306.07785Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2306.07785Direct OA link when available
- Concepts
-
Computer science, Commit, Exploit, Domain (mathematical analysis), Pipeline (software), Computer security, Speculative execution, Code (set theory), Key (lock), Replay attack, Operating system, Parallel computing, Computer network, Hash function, Programming language, Database, Mathematics, Set (abstract data type), Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4380715254 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2306.07785 |
| ids.doi | https://doi.org/10.48550/arxiv.2306.07785 |
| ids.openalex | https://openalex.org/W4380715254 |
| fwci | |
| type | preprint |
| title | SafeBet: Secure, Simple, and Fast Speculative Execution |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11424 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9994999766349792 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Security and Verification in Computing |
| topics[1].id | https://openalex.org/T10502 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9947999715805054 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Advanced Memory and Neural Computing |
| topics[2].id | https://openalex.org/T11614 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9884999990463257 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Data Security Solutions |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8675734996795654 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C153180980 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6752049922943115 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q19776675 |
| concepts[1].display_name | Commit |
| concepts[2].id | https://openalex.org/C165696696 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6534081697463989 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[2].display_name | Exploit |
| concepts[3].id | https://openalex.org/C36503486 |
| concepts[3].level | 2 |
| concepts[3].score | 0.541254460811615 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q11235244 |
| concepts[3].display_name | Domain (mathematical analysis) |
| concepts[4].id | https://openalex.org/C43521106 |
| concepts[4].level | 2 |
| concepts[4].score | 0.48483383655548096 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2165493 |
| concepts[4].display_name | Pipeline (software) |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4794113337993622 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C141331961 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4694874882698059 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2164465 |
| concepts[6].display_name | Speculative execution |
| concepts[7].id | https://openalex.org/C2776760102 |
| concepts[7].level | 3 |
| concepts[7].score | 0.44734853506088257 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q5139990 |
| concepts[7].display_name | Code (set theory) |
| concepts[8].id | https://openalex.org/C26517878 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4401063919067383 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[8].display_name | Key (lock) |
| concepts[9].id | https://openalex.org/C11560541 |
| concepts[9].level | 3 |
| concepts[9].score | 0.43987706303596497 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1756025 |
| concepts[9].display_name | Replay attack |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.4154527485370636 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| concepts[11].id | https://openalex.org/C173608175 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3784716725349426 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q232661 |
| concepts[11].display_name | Parallel computing |
| concepts[12].id | https://openalex.org/C31258907 |
| concepts[12].level | 1 |
| concepts[12].score | 0.352729856967926 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[12].display_name | Computer network |
| concepts[13].id | https://openalex.org/C99138194 |
| concepts[13].level | 2 |
| concepts[13].score | 0.21804174780845642 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[13].display_name | Hash function |
| concepts[14].id | https://openalex.org/C199360897 |
| concepts[14].level | 1 |
| concepts[14].score | 0.14697420597076416 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[14].display_name | Programming language |
| concepts[15].id | https://openalex.org/C77088390 |
| concepts[15].level | 1 |
| concepts[15].score | 0.1417171061038971 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[15].display_name | Database |
| concepts[16].id | https://openalex.org/C33923547 |
| concepts[16].level | 0 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[16].display_name | Mathematics |
| concepts[17].id | https://openalex.org/C177264268 |
| concepts[17].level | 2 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[17].display_name | Set (abstract data type) |
| concepts[18].id | https://openalex.org/C134306372 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[18].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8675734996795654 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/commit |
| keywords[1].score | 0.6752049922943115 |
| keywords[1].display_name | Commit |
| keywords[2].id | https://openalex.org/keywords/exploit |
| keywords[2].score | 0.6534081697463989 |
| keywords[2].display_name | Exploit |
| keywords[3].id | https://openalex.org/keywords/domain |
| keywords[3].score | 0.541254460811615 |
| keywords[3].display_name | Domain (mathematical analysis) |
| keywords[4].id | https://openalex.org/keywords/pipeline |
| keywords[4].score | 0.48483383655548096 |
| keywords[4].display_name | Pipeline (software) |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.4794113337993622 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/speculative-execution |
| keywords[6].score | 0.4694874882698059 |
| keywords[6].display_name | Speculative execution |
| keywords[7].id | https://openalex.org/keywords/code |
| keywords[7].score | 0.44734853506088257 |
| keywords[7].display_name | Code (set theory) |
| keywords[8].id | https://openalex.org/keywords/key |
| keywords[8].score | 0.4401063919067383 |
| keywords[8].display_name | Key (lock) |
| keywords[9].id | https://openalex.org/keywords/replay-attack |
| keywords[9].score | 0.43987706303596497 |
| keywords[9].display_name | Replay attack |
| keywords[10].id | https://openalex.org/keywords/operating-system |
| keywords[10].score | 0.4154527485370636 |
| keywords[10].display_name | Operating system |
| keywords[11].id | https://openalex.org/keywords/parallel-computing |
| keywords[11].score | 0.3784716725349426 |
| keywords[11].display_name | Parallel computing |
| keywords[12].id | https://openalex.org/keywords/computer-network |
| keywords[12].score | 0.352729856967926 |
| keywords[12].display_name | Computer network |
| keywords[13].id | https://openalex.org/keywords/hash-function |
| keywords[13].score | 0.21804174780845642 |
| keywords[13].display_name | Hash function |
| keywords[14].id | https://openalex.org/keywords/programming-language |
| keywords[14].score | 0.14697420597076416 |
| keywords[14].display_name | Programming language |
| keywords[15].id | https://openalex.org/keywords/database |
| keywords[15].score | 0.1417171061038971 |
| keywords[15].display_name | Database |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2306.07785 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2306.07785 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2306.07785 |
| locations[1].id | doi:10.48550/arxiv.2306.07785 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2306.07785 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5109760449 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Conor James Green |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Green, Conor |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5112937242 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Cole Nelson |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Nelson, Cole |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5069139257 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-4164-4542 |
| authorships[2].author.display_name | Mithuna Thottethodi |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Thottethodi, Mithuna |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5103145581 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6624-4372 |
| authorships[3].author.display_name | T. N. Vijaykumar |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Vijaykumar, T. N. |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2306.07785 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | SafeBet: Secure, Simple, and Fast Speculative Execution |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11424 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9994999766349792 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Security and Verification in Computing |
| related_works | https://openalex.org/W4367365664, https://openalex.org/W4293227618, https://openalex.org/W2136634148, https://openalex.org/W3122851392, https://openalex.org/W3122800671, https://openalex.org/W17155033, https://openalex.org/W4250708772, https://openalex.org/W2622383771, https://openalex.org/W2904129921, https://openalex.org/W3083271878 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2306.07785 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2306.07785 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2306.07785 |
| primary_location.id | pmh:oai:arXiv.org:2306.07785 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2306.07785 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2306.07785 |
| publication_date | 2023-06-13 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 79, 178 |
| abstract_inverted_index.6% | 165 |
| abstract_inverted_index.We | 102 |
| abstract_inverted_index.an | 157 |
| abstract_inverted_index.at | 169 |
| abstract_inverted_index.by | 31, 88, 190 |
| abstract_inverted_index.if | 84 |
| abstract_inverted_index.in | 37 |
| abstract_inverted_index.is | 70, 82 |
| abstract_inverted_index.no | 143 |
| abstract_inverted_index.of | 171, 181 |
| abstract_inverted_index.on | 72, 166, 192 |
| abstract_inverted_index.to | 6, 106, 123, 137, 145, 162, 187 |
| abstract_inverted_index.we | 50 |
| abstract_inverted_index.83% | 191 |
| abstract_inverted_index.and | 8, 17, 46, 56, 66, 98, 111, 183 |
| abstract_inverted_index.but | 26 |
| abstract_inverted_index.has | 94 |
| abstract_inverted_index.key | 74 |
| abstract_inverted_index.not | 58 |
| abstract_inverted_index.per | 160 |
| abstract_inverted_index.the | 13, 28, 38, 73, 85, 89, 116, 146, 172 |
| abstract_inverted_index.(63% | 168 |
| abstract_inverted_index.been | 95 |
| abstract_inverted_index.both | 64 |
| abstract_inverted_index.code | 110, 128 |
| abstract_inverted_index.core | 161 |
| abstract_inverted_index.data | 11, 112 |
| abstract_inverted_index.does | 57 |
| abstract_inverted_index.even | 36 |
| abstract_inverted_index.high | 67 |
| abstract_inverted_index.lags | 189 |
| abstract_inverted_index.loss | 45 |
| abstract_inverted_index.most | 33 |
| abstract_inverted_index.read | 7 |
| abstract_inverted_index.safe | 61, 83 |
| abstract_inverted_index.same | 90 |
| abstract_inverted_index.show | 153 |
| abstract_inverted_index.that | 76, 154 |
| abstract_inverted_index.this | 104 |
| abstract_inverted_index.uses | 156 |
| abstract_inverted_index.wait | 133 |
| abstract_inverted_index.with | 141 |
| abstract_inverted_index.SMACT | 159 |
| abstract_inverted_index.Table | 121 |
| abstract_inverted_index.allow | 22 |
| abstract_inverted_index.based | 71 |
| abstract_inverted_index.case, | 41 |
| abstract_inverted_index.delay | 59 |
| abstract_inverted_index.inter | 108 |
| abstract_inverted_index.most, | 60 |
| abstract_inverted_index.only, | 55 |
| abstract_inverted_index.track | 124 |
| abstract_inverted_index.trust | 15, 92, 126 |
| abstract_inverted_index.until | 134 |
| abstract_inverted_index.using | 150 |
| abstract_inverted_index.which | 42, 53, 176 |
| abstract_inverted_index.8.3-KB | 158 |
| abstract_inverted_index.Access | 119 |
| abstract_inverted_index.Memory | 118 |
| abstract_inverted_index.Recent | 19 |
| abstract_inverted_index.access | 87 |
| abstract_inverted_index.allows | 54 |
| abstract_inverted_index.behind | 175 |
| abstract_inverted_index.change | 144 |
| abstract_inverted_index.commit | 136 |
| abstract_inverted_index.domain | 16, 93, 127 |
| abstract_inverted_index.extend | 103 |
| abstract_inverted_index.handle | 107 |
| abstract_inverted_index.incurs | 43 |
| abstract_inverted_index.pairs. | 130 |
| abstract_inverted_index.scheme | 180 |
| abstract_inverted_index.static | 91 |
| abstract_inverted_index.unsafe | 173 |
| abstract_inverted_index.within | 164 |
| abstract_inverted_index.worst) | 170 |
| abstract_inverted_index.(SMACT) | 122 |
| abstract_inverted_index.Control | 120 |
| abstract_inverted_index.SafeBet | 52, 69, 114, 155 |
| abstract_inverted_index.SpecCPU | 151 |
| abstract_inverted_index.Spectre | 0 |
| abstract_inverted_index.attacks | 1 |
| abstract_inverted_index.average | 167 |
| abstract_inverted_index.employs | 115 |
| abstract_inverted_index.exploit | 2 |
| abstract_inverted_index.outside | 12 |
| abstract_inverted_index.perform | 163 |
| abstract_inverted_index.prevent | 27 |
| abstract_inverted_index.propose | 51 |
| abstract_inverted_index.replay, | 140 |
| abstract_inverted_index.schemes | 21 |
| abstract_inverted_index.trigger | 138 |
| abstract_inverted_index.unsafe, | 100 |
| abstract_inverted_index.Instead, | 49 |
| abstract_inverted_index.Software | 148 |
| abstract_inverted_index.accesses | 25, 132 |
| abstract_inverted_index.average. | 193 |
| abstract_inverted_index.baseline | 174 |
| abstract_inverted_index.delaying | 32 |
| abstract_inverted_index.hardware | 20, 47, 184 |
| abstract_inverted_index.location | 81 |
| abstract_inverted_index.previous | 179 |
| abstract_inverted_index.reaching | 135 |
| abstract_inverted_index.sandbox. | 18 |
| abstract_inverted_index.secret's | 29 |
| abstract_inverted_index.security | 65, 182 |
| abstract_inverted_index.transmit | 9 |
| abstract_inverted_index.accesses, | 62 |
| abstract_inverted_index.accessing | 78 |
| abstract_inverted_index.achieving | 63 |
| abstract_inverted_index.committed | 96 |
| abstract_inverted_index.execution | 5 |
| abstract_inverted_index.forbidden | 10 |
| abstract_inverted_index.no-attack | 40 |
| abstract_inverted_index.pipeline. | 147 |
| abstract_inverted_index.virtually | 142 |
| abstract_inverted_index.Disallowed | 131 |
| abstract_inverted_index.SafeBet's, | 188 |
| abstract_inverted_index.attacker's | 14 |
| abstract_inverted_index.benchmarks | 152 |
| abstract_inverted_index.comparable | 186 |
| abstract_inverted_index.complexity | 185 |
| abstract_inverted_index.location's | 86 |
| abstract_inverted_index.otherwise. | 101 |
| abstract_inverted_index.well-known | 139 |
| abstract_inverted_index.Speculative | 117 |
| abstract_inverted_index.complexity. | 48 |
| abstract_inverted_index.destination | 80 |
| abstract_inverted_index.observation | 75, 105 |
| abstract_inverted_index.performance | 44 |
| abstract_inverted_index.potentially | 99 |
| abstract_inverted_index.previously; | 97 |
| abstract_inverted_index.simulations | 149 |
| abstract_inverted_index.speculative | 4, 24 |
| abstract_inverted_index.instructions | 35 |
| abstract_inverted_index.performance. | 68 |
| abstract_inverted_index.transmission | 30 |
| abstract_inverted_index.trust-domain | 109 |
| abstract_inverted_index.interactions. | 113 |
| abstract_inverted_index.speculatively | 77 |
| abstract_inverted_index.microprocessor | 3 |
| abstract_inverted_index.non-speculative | 125 |
| abstract_inverted_index.NDA-restrictive, | 177 |
| abstract_inverted_index.access-dependent | 34 |
| abstract_inverted_index.potentially-unsafe | 23 |
| abstract_inverted_index.region-destination | 129 |
| abstract_inverted_index.predominantly-common, | 39 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7400000095367432 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |