dc.contributor.author | Winderix, Hans | |
dc.contributor.author | Bognar, Marton | |
dc.contributor.author | Noorman, Job | |
dc.contributor.author | Daniel, Lysly-Ann | |
dc.contributor.author | Piessens, Frank | |
dc.date.accessioned | 2024-12-19T08:57:55Z | |
dc.date.available | 2024-11-30T16:46:41Z | |
dc.date.available | 2024-12-19T08:57:55Z | |
dc.date.issued | 2024 | |
dc.identifier.isbn | 979-8-3503-3131-8 | |
dc.identifier.issn | 1081-6011 | |
dc.identifier.other | WOS:001310833903043 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/44878.2 | |
dc.source | WOS | |
dc.title | Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs | |
dc.type | Proceedings paper | |
dc.identifier.doi | 10.1109/SP54263.2024.00047 | |
dc.identifier.eisbn | 979-8-3503-3130-1 | |
dc.source.numberofpages | 19 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 3697 | |
dc.source.endpage | 3715 | |
dc.source.conference | 45th IEEE Symposium on Security and Privacy (SP) | |
dc.source.conferencedate | MAY 20-23, 2024 | |
dc.source.conferencelocation | San Francisco | |
dc.source.journal | N/A | |
imec.availability | Published - imec | |
dc.description.wosFundingText | This research was partially funded by the ORSHIN project (Horizon Europe grant agreement No. 101070008), by the Research Foundation Flanders (FWO), and by the Flemish Research Programme Cybersecurity. We thank the anonymous reviewers for their valuable feedback. | |