TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/isca52012.2021.00037
Timing side channels have been used to extract cryptographic keys and sensitive documents, even from trusted enclaves. In this paper, we focus on cache side channels created by access to shared code or data in the memory hierarchy. This vulnerability is exploited by several known attacks, e.g, evict+reload for recovering an RSA key and Spectre variants for data leaked due to speculative accesses. The key insight in this paper is the importance of the first access to the shared data after a victim brings the data into the cache. To eliminate the timing side channel, we ensure that the first access by a process to any cache line loaded by another process results in a miss. We accomplish this goal by using a combination of timestamps and a novel hardware design to allow efficient parallel comparisons of the timestamps. The solution works at all the cache levels and defends against an attacker process running on another core, same core, or another hyperthread. Our design retains the benefits of a shared cache: allowing processes to utilize the entire cache for their execution and retaining a single copy of shared code and data (data deduplication). Our implementation in the GEM5 simulator demonstrates that the system is able to defend against RSA key extraction. We evaluate performance using SPECCPU2006 and observe overhead due to first access delay to be 2.17%. The overhead due to the security context bookkeeping is of the order of 0.3%.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.1109/isca52012.2021.00037
- OA Status
- green
- Cited By
- 10
- References
- 68
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3090550073
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3090550073Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/isca52012.2021.00037Digital Object Identifier
- Title
-
TimeCache: Using Time to Eliminate Cache Side Channels when Sharing SoftwareWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-06-01Full publication date if available
- Authors
-
Divya Ojha, Sandhya DwarkadasList of authors in order
- Landing page
-
https://doi.org/10.1109/isca52012.2021.00037Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2009.14732Direct OA link when available
- Concepts
-
Computer science, Cache, Cache invalidation, Cache pollution, Smart Cache, Cache coloring, Page cache, Cache algorithms, Bus sniffing, Side channel attack, Parallel computing, Operating system, CPU cache, Embedded system, Computer network, Cryptography, Computer securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
10Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2, 2024: 1, 2023: 4, 2022: 3Per-year citation counts (last 5 years)
- References (count)
-
68Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3090550073 |
|---|---|
| doi | https://doi.org/10.1109/isca52012.2021.00037 |
| ids.doi | https://doi.org/10.1109/isca52012.2021.00037 |
| ids.mag | 3090550073 |
| ids.openalex | https://openalex.org/W3090550073 |
| fwci | 1.1288286 |
| type | preprint |
| title | TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 387 |
| biblio.first_page | 375 |
| topics[0].id | https://openalex.org/T11424 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Security and Verification in Computing |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9943000078201294 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.984499990940094 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| funders[0].id | https://openalex.org/F4320306076 |
| funders[0].ror | https://ror.org/021nxhr62 |
| funders[0].display_name | National Science Foundation |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8767123222351074 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C115537543 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7888598442077637 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q165596 |
| concepts[1].display_name | Cache |
| concepts[2].id | https://openalex.org/C25536678 |
| concepts[2].level | 5 |
| concepts[2].score | 0.6666178107261658 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q5015977 |
| concepts[2].display_name | Cache invalidation |
| concepts[3].id | https://openalex.org/C113166858 |
| concepts[3].level | 5 |
| concepts[3].score | 0.5974328517913818 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5015981 |
| concepts[3].display_name | Cache pollution |
| concepts[4].id | https://openalex.org/C167713795 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5546040534973145 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q352090 |
| concepts[4].display_name | Smart Cache |
| concepts[5].id | https://openalex.org/C201148951 |
| concepts[5].level | 4 |
| concepts[5].score | 0.54982590675354 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q5015976 |
| concepts[5].display_name | Cache coloring |
| concepts[6].id | https://openalex.org/C36340418 |
| concepts[6].level | 5 |
| concepts[6].score | 0.5365778207778931 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7124288 |
| concepts[6].display_name | Page cache |
| concepts[7].id | https://openalex.org/C38556500 |
| concepts[7].level | 4 |
| concepts[7].score | 0.5289362072944641 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q13404475 |
| concepts[7].display_name | Cache algorithms |
| concepts[8].id | https://openalex.org/C51185590 |
| concepts[8].level | 5 |
| concepts[8].score | 0.5120840072631836 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1017228 |
| concepts[8].display_name | Bus sniffing |
| concepts[9].id | https://openalex.org/C49289754 |
| concepts[9].level | 3 |
| concepts[9].score | 0.43825218081474304 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2267081 |
| concepts[9].display_name | Side channel attack |
| concepts[10].id | https://openalex.org/C173608175 |
| concepts[10].level | 1 |
| concepts[10].score | 0.40244877338409424 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q232661 |
| concepts[10].display_name | Parallel computing |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.38138988614082336 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| concepts[12].id | https://openalex.org/C189783530 |
| concepts[12].level | 3 |
| concepts[12].score | 0.3808257579803467 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q352090 |
| concepts[12].display_name | CPU cache |
| concepts[13].id | https://openalex.org/C149635348 |
| concepts[13].level | 1 |
| concepts[13].score | 0.35399937629699707 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[13].display_name | Embedded system |
| concepts[14].id | https://openalex.org/C31258907 |
| concepts[14].level | 1 |
| concepts[14].score | 0.3505255877971649 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[14].display_name | Computer network |
| concepts[15].id | https://openalex.org/C178489894 |
| concepts[15].level | 2 |
| concepts[15].score | 0.25705668330192566 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[15].display_name | Cryptography |
| concepts[16].id | https://openalex.org/C38652104 |
| concepts[16].level | 1 |
| concepts[16].score | 0.12709474563598633 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[16].display_name | Computer security |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8767123222351074 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cache |
| keywords[1].score | 0.7888598442077637 |
| keywords[1].display_name | Cache |
| keywords[2].id | https://openalex.org/keywords/cache-invalidation |
| keywords[2].score | 0.6666178107261658 |
| keywords[2].display_name | Cache invalidation |
| keywords[3].id | https://openalex.org/keywords/cache-pollution |
| keywords[3].score | 0.5974328517913818 |
| keywords[3].display_name | Cache pollution |
| keywords[4].id | https://openalex.org/keywords/smart-cache |
| keywords[4].score | 0.5546040534973145 |
| keywords[4].display_name | Smart Cache |
| keywords[5].id | https://openalex.org/keywords/cache-coloring |
| keywords[5].score | 0.54982590675354 |
| keywords[5].display_name | Cache coloring |
| keywords[6].id | https://openalex.org/keywords/page-cache |
| keywords[6].score | 0.5365778207778931 |
| keywords[6].display_name | Page cache |
| keywords[7].id | https://openalex.org/keywords/cache-algorithms |
| keywords[7].score | 0.5289362072944641 |
| keywords[7].display_name | Cache algorithms |
| keywords[8].id | https://openalex.org/keywords/bus-sniffing |
| keywords[8].score | 0.5120840072631836 |
| keywords[8].display_name | Bus sniffing |
| keywords[9].id | https://openalex.org/keywords/side-channel-attack |
| keywords[9].score | 0.43825218081474304 |
| keywords[9].display_name | Side channel attack |
| keywords[10].id | https://openalex.org/keywords/parallel-computing |
| keywords[10].score | 0.40244877338409424 |
| keywords[10].display_name | Parallel computing |
| keywords[11].id | https://openalex.org/keywords/operating-system |
| keywords[11].score | 0.38138988614082336 |
| keywords[11].display_name | Operating system |
| keywords[12].id | https://openalex.org/keywords/cpu-cache |
| keywords[12].score | 0.3808257579803467 |
| keywords[12].display_name | CPU cache |
| keywords[13].id | https://openalex.org/keywords/embedded-system |
| keywords[13].score | 0.35399937629699707 |
| keywords[13].display_name | Embedded system |
| keywords[14].id | https://openalex.org/keywords/computer-network |
| keywords[14].score | 0.3505255877971649 |
| keywords[14].display_name | Computer network |
| keywords[15].id | https://openalex.org/keywords/cryptography |
| keywords[15].score | 0.25705668330192566 |
| keywords[15].display_name | Cryptography |
| keywords[16].id | https://openalex.org/keywords/computer-security |
| keywords[16].score | 0.12709474563598633 |
| keywords[16].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1109/isca52012.2021.00037 |
| locations[0].is_oa | False |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA) |
| locations[0].landing_page_url | https://doi.org/10.1109/isca52012.2021.00037 |
| locations[1].id | pmh:oai:arXiv.org:2009.14732 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | https://arxiv.org/pdf/2009.14732 |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://arxiv.org/abs/2009.14732 |
| indexed_in | arxiv, crossref |
| authorships[0].author.id | https://openalex.org/A5024282301 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3814-2421 |
| authorships[0].author.display_name | Divya Ojha |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I5388228 |
| authorships[0].affiliations[0].raw_affiliation_string | Dept. of Computer Science, University of Rochester, Rochester, NY, USA |
| authorships[0].institutions[0].id | https://openalex.org/I5388228 |
| authorships[0].institutions[0].ror | https://ror.org/022kthw22 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I5388228 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | University of Rochester |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Divya Ojha |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Dept. of Computer Science, University of Rochester, Rochester, NY, USA |
| authorships[1].author.id | https://openalex.org/A5013232946 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-2631-8191 |
| authorships[1].author.display_name | Sandhya Dwarkadas |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I5388228 |
| authorships[1].affiliations[0].raw_affiliation_string | Dept. of Computer Science, University of Rochester, Rochester, NY, USA |
| authorships[1].institutions[0].id | https://openalex.org/I5388228 |
| authorships[1].institutions[0].ror | https://ror.org/022kthw22 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I5388228 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | University of Rochester |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Sandhya Dwarkadas |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Dept. of Computer Science, University of Rochester, Rochester, NY, USA |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2009.14732 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2020-10-08T00:00:00 |
| display_name | TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11424 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Security and Verification in Computing |
| related_works | https://openalex.org/W2161101294, https://openalex.org/W2148571123, https://openalex.org/W2026179701, https://openalex.org/W4380881125, https://openalex.org/W2184371594, https://openalex.org/W4312759433, https://openalex.org/W2302406141, https://openalex.org/W2108638805, https://openalex.org/W2113875634, https://openalex.org/W2034465099 |
| cited_by_count | 10 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 3 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2009.14732 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2009.14732 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2009.14732 |
| primary_location.id | doi:10.1109/isca52012.2021.00037 |
| primary_location.is_oa | False |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA) |
| primary_location.landing_page_url | https://doi.org/10.1109/isca52012.2021.00037 |
| publication_date | 2021-06-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2406174928, https://openalex.org/W2947103291, https://openalex.org/W6753302588, https://openalex.org/W2775990858, https://openalex.org/W6720087123, https://openalex.org/W6637116351, https://openalex.org/W2954241526, https://openalex.org/W2904129921, https://openalex.org/W2171863291, https://openalex.org/W2051751274, https://openalex.org/W2952265249, https://openalex.org/W2905380323, https://openalex.org/W3047954480, https://openalex.org/W4243577185, https://openalex.org/W4231164953, https://openalex.org/W2255548496, https://openalex.org/W2540422252, https://openalex.org/W3015702715, https://openalex.org/W1934458198, https://openalex.org/W6629297748, https://openalex.org/W2100621037, https://openalex.org/W6633448724, https://openalex.org/W2172060328, https://openalex.org/W4241773843, https://openalex.org/W2137243422, https://openalex.org/W2394822940, https://openalex.org/W1971212200, https://openalex.org/W6752364981, https://openalex.org/W2810584084, https://openalex.org/W6747544890, https://openalex.org/W6753807672, https://openalex.org/W2147657366, https://openalex.org/W2073748734, https://openalex.org/W6891923490, https://openalex.org/W2982848142, https://openalex.org/W2801000640, https://openalex.org/W6754707075, https://openalex.org/W2001759130, https://openalex.org/W2337480911, https://openalex.org/W6628261430, https://openalex.org/W2795015774, https://openalex.org/W2001986196, https://openalex.org/W4247198503, https://openalex.org/W3016511751, https://openalex.org/W6766700459, https://openalex.org/W2625555681, https://openalex.org/W2903910116, https://openalex.org/W2751989915, https://openalex.org/W2808110847, https://openalex.org/W2152450729, https://openalex.org/W2465313794, https://openalex.org/W2889467723, https://openalex.org/W1988374166, https://openalex.org/W2963311060, https://openalex.org/W2884364581, https://openalex.org/W2966638792, https://openalex.org/W2116469687, https://openalex.org/W1664413462, https://openalex.org/W2964281551, https://openalex.org/W1555558540, https://openalex.org/W1488058190, https://openalex.org/W2978325751, https://openalex.org/W2166293920, https://openalex.org/W2807403537, https://openalex.org/W1427174644, https://openalex.org/W2147758029, https://openalex.org/W2962986039, https://openalex.org/W2327709439 |
| referenced_works_count | 68 |
| abstract_inverted_index.a | 81, 102, 114, 122, 127, 168, 183 |
| abstract_inverted_index.In | 17 |
| abstract_inverted_index.To | 89 |
| abstract_inverted_index.We | 116, 211 |
| abstract_inverted_index.an | 50, 150 |
| abstract_inverted_index.at | 142 |
| abstract_inverted_index.be | 225 |
| abstract_inverted_index.by | 27, 42, 101, 109, 120 |
| abstract_inverted_index.in | 34, 66, 113, 195 |
| abstract_inverted_index.is | 40, 69, 203, 235 |
| abstract_inverted_index.of | 72, 124, 136, 167, 186, 236, 239 |
| abstract_inverted_index.on | 22, 154 |
| abstract_inverted_index.or | 32, 159 |
| abstract_inverted_index.to | 6, 29, 60, 76, 104, 131, 173, 205, 220, 224, 230 |
| abstract_inverted_index.we | 20, 95 |
| abstract_inverted_index.Our | 162, 193 |
| abstract_inverted_index.RSA | 51, 208 |
| abstract_inverted_index.The | 63, 139, 227 |
| abstract_inverted_index.all | 143 |
| abstract_inverted_index.and | 10, 53, 126, 147, 181, 189, 216 |
| abstract_inverted_index.any | 105 |
| abstract_inverted_index.due | 59, 219, 229 |
| abstract_inverted_index.for | 48, 56, 178 |
| abstract_inverted_index.key | 52, 64, 209 |
| abstract_inverted_index.the | 35, 70, 73, 77, 84, 87, 91, 98, 137, 144, 165, 175, 196, 201, 231, 237 |
| abstract_inverted_index.GEM5 | 197 |
| abstract_inverted_index.This | 38 |
| abstract_inverted_index.able | 204 |
| abstract_inverted_index.been | 4 |
| abstract_inverted_index.code | 31, 188 |
| abstract_inverted_index.copy | 185 |
| abstract_inverted_index.data | 33, 57, 79, 85, 190 |
| abstract_inverted_index.e.g, | 46 |
| abstract_inverted_index.even | 13 |
| abstract_inverted_index.from | 14 |
| abstract_inverted_index.goal | 119 |
| abstract_inverted_index.have | 3 |
| abstract_inverted_index.into | 86 |
| abstract_inverted_index.keys | 9 |
| abstract_inverted_index.line | 107 |
| abstract_inverted_index.same | 157 |
| abstract_inverted_index.side | 1, 24, 93 |
| abstract_inverted_index.that | 97, 200 |
| abstract_inverted_index.this | 18, 67, 118 |
| abstract_inverted_index.used | 5 |
| abstract_inverted_index.(data | 191 |
| abstract_inverted_index.0.3%. | 240 |
| abstract_inverted_index.after | 80 |
| abstract_inverted_index.allow | 132 |
| abstract_inverted_index.cache | 23, 106, 145, 177 |
| abstract_inverted_index.core, | 156, 158 |
| abstract_inverted_index.delay | 223 |
| abstract_inverted_index.first | 74, 99, 221 |
| abstract_inverted_index.focus | 21 |
| abstract_inverted_index.known | 44 |
| abstract_inverted_index.miss. | 115 |
| abstract_inverted_index.novel | 128 |
| abstract_inverted_index.order | 238 |
| abstract_inverted_index.paper | 68 |
| abstract_inverted_index.their | 179 |
| abstract_inverted_index.using | 121, 214 |
| abstract_inverted_index.works | 141 |
| abstract_inverted_index.2.17%. | 226 |
| abstract_inverted_index.Timing | 0 |
| abstract_inverted_index.access | 28, 75, 100, 222 |
| abstract_inverted_index.brings | 83 |
| abstract_inverted_index.cache. | 88 |
| abstract_inverted_index.cache: | 170 |
| abstract_inverted_index.defend | 206 |
| abstract_inverted_index.design | 130, 163 |
| abstract_inverted_index.ensure | 96 |
| abstract_inverted_index.entire | 176 |
| abstract_inverted_index.leaked | 58 |
| abstract_inverted_index.levels | 146 |
| abstract_inverted_index.loaded | 108 |
| abstract_inverted_index.memory | 36 |
| abstract_inverted_index.paper, | 19 |
| abstract_inverted_index.shared | 30, 78, 169, 187 |
| abstract_inverted_index.single | 184 |
| abstract_inverted_index.system | 202 |
| abstract_inverted_index.timing | 92 |
| abstract_inverted_index.victim | 82 |
| abstract_inverted_index.Spectre | 54 |
| abstract_inverted_index.against | 149, 207 |
| abstract_inverted_index.another | 110, 155, 160 |
| abstract_inverted_index.context | 233 |
| abstract_inverted_index.created | 26 |
| abstract_inverted_index.defends | 148 |
| abstract_inverted_index.extract | 7 |
| abstract_inverted_index.insight | 65 |
| abstract_inverted_index.observe | 217 |
| abstract_inverted_index.process | 103, 111, 152 |
| abstract_inverted_index.results | 112 |
| abstract_inverted_index.retains | 164 |
| abstract_inverted_index.running | 153 |
| abstract_inverted_index.several | 43 |
| abstract_inverted_index.trusted | 15 |
| abstract_inverted_index.utilize | 174 |
| abstract_inverted_index.allowing | 171 |
| abstract_inverted_index.attacker | 151 |
| abstract_inverted_index.attacks, | 45 |
| abstract_inverted_index.benefits | 166 |
| abstract_inverted_index.channel, | 94 |
| abstract_inverted_index.channels | 2, 25 |
| abstract_inverted_index.evaluate | 212 |
| abstract_inverted_index.hardware | 129 |
| abstract_inverted_index.overhead | 218, 228 |
| abstract_inverted_index.parallel | 134 |
| abstract_inverted_index.security | 232 |
| abstract_inverted_index.solution | 140 |
| abstract_inverted_index.variants | 55 |
| abstract_inverted_index.accesses. | 62 |
| abstract_inverted_index.efficient | 133 |
| abstract_inverted_index.eliminate | 90 |
| abstract_inverted_index.enclaves. | 16 |
| abstract_inverted_index.execution | 180 |
| abstract_inverted_index.exploited | 41 |
| abstract_inverted_index.processes | 172 |
| abstract_inverted_index.retaining | 182 |
| abstract_inverted_index.sensitive | 11 |
| abstract_inverted_index.simulator | 198 |
| abstract_inverted_index.accomplish | 117 |
| abstract_inverted_index.documents, | 12 |
| abstract_inverted_index.hierarchy. | 37 |
| abstract_inverted_index.importance | 71 |
| abstract_inverted_index.recovering | 49 |
| abstract_inverted_index.timestamps | 125 |
| abstract_inverted_index.SPECCPU2006 | 215 |
| abstract_inverted_index.bookkeeping | 234 |
| abstract_inverted_index.combination | 123 |
| abstract_inverted_index.comparisons | 135 |
| abstract_inverted_index.extraction. | 210 |
| abstract_inverted_index.performance | 213 |
| abstract_inverted_index.speculative | 61 |
| abstract_inverted_index.timestamps. | 138 |
| abstract_inverted_index.demonstrates | 199 |
| abstract_inverted_index.evict+reload | 47 |
| abstract_inverted_index.hyperthread. | 161 |
| abstract_inverted_index.cryptographic | 8 |
| abstract_inverted_index.vulnerability | 39 |
| abstract_inverted_index.implementation | 194 |
| abstract_inverted_index.deduplication). | 192 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.75 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.81719722 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |