Publication:

Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs

 
dc.contributor.authorWinderix, Hans
dc.contributor.authorBognar, Marton
dc.contributor.authorNoorman, Job
dc.contributor.authorDaniel, Lysly-Ann
dc.contributor.authorPiessens, Frank
dc.date.accessioned2024-12-19T08:57:55Z
dc.date.available2024-11-30T16:46:41Z
dc.date.available2024-12-19T08:57:55Z
dc.date.issued2024
dc.description.wosFundingTextThis research was partially funded by the ORSHIN project (Horizon Europe grant agreement No. 101070008), by the Research Foundation Flanders (FWO), and by the Flemish Research Programme Cybersecurity. We thank the anonymous reviewers for their valuable feedback.
dc.identifier.doi10.1109/SP54263.2024.00047
dc.identifier.eisbn979-8-3503-3130-1
dc.identifier.isbn979-8-3503-3131-8
dc.identifier.issn1081-6011
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44878
dc.publisherIEEE COMPUTER SOC
dc.source.beginpage3697
dc.source.conference45th IEEE Symposium on Security and Privacy (SP)
dc.source.conferencedateMAY 20-23, 2024
dc.source.conferencelocationSan Francisco
dc.source.endpage3715
dc.source.journalN/A
dc.source.numberofpages19
dc.subject.keywordsCOMPILATION
dc.title

Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: