Show simple item record

dc.contributor.authorWinderix, Hans
dc.contributor.authorBognar, Marton
dc.contributor.authorNoorman, Job
dc.contributor.authorDaniel, Lysly-Ann
dc.contributor.authorPiessens, Frank
dc.date.accessioned2024-12-19T08:57:55Z
dc.date.available2024-11-30T16:46:41Z
dc.date.available2024-12-19T08:57:55Z
dc.date.issued2024
dc.identifier.isbn979-8-3503-3131-8
dc.identifier.issn1081-6011
dc.identifier.otherWOS:001310833903043
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44878.2
dc.sourceWOS
dc.titleArchitectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs
dc.typeProceedings paper
dc.identifier.doi10.1109/SP54263.2024.00047
dc.identifier.eisbn979-8-3503-3130-1
dc.source.numberofpages19
dc.source.peerreviewyes
dc.source.beginpage3697
dc.source.endpage3715
dc.source.conference45th IEEE Symposium on Security and Privacy (SP)
dc.source.conferencedateMAY 20-23, 2024
dc.source.conferencelocationSan Francisco
dc.source.journalN/A
imec.availabilityPublished - imec
dc.description.wosFundingTextThis research was partially funded by the ORSHIN project (Horizon Europe grant agreement No. 101070008), by the Research Foundation Flanders (FWO), and by the Flemish Research Programme Cybersecurity. We thank the anonymous reviewers for their valuable feedback.


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version