Publication:
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs
| dc.contributor.author | Winderix, Hans | |
| dc.contributor.author | Bognar, Marton | |
| dc.contributor.author | Noorman, Job | |
| dc.contributor.author | Daniel, Lysly-Ann | |
| dc.contributor.author | Piessens, Frank | |
| dc.date.accessioned | 2024-12-19T08:57:55Z | |
| dc.date.available | 2024-11-30T16:46:41Z | |
| dc.date.available | 2024-12-19T08:57:55Z | |
| dc.date.issued | 2024 | |
| dc.description.wosFundingText | This research was partially funded by the ORSHIN project (Horizon Europe grant agreement No. 101070008), by the Research Foundation Flanders (FWO), and by the Flemish Research Programme Cybersecurity. We thank the anonymous reviewers for their valuable feedback. | |
| dc.identifier.doi | 10.1109/SP54263.2024.00047 | |
| dc.identifier.eisbn | 979-8-3503-3130-1 | |
| dc.identifier.isbn | 979-8-3503-3131-8 | |
| dc.identifier.issn | 1081-6011 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/44878 | |
| dc.publisher | IEEE COMPUTER SOC | |
| dc.source.beginpage | 3697 | |
| dc.source.conference | 45th IEEE Symposium on Security and Privacy (SP) | |
| dc.source.conferencedate | MAY 20-23, 2024 | |
| dc.source.conferencelocation | San Francisco | |
| dc.source.endpage | 3715 | |
| dc.source.journal | N/A | |
| dc.source.numberofpages | 19 | |
| dc.subject.keywords | COMPILATION | |
| dc.title | Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |