{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:41:00Z","timestamp":1742956860804,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031697654"},{"type":"electronic","value":"9783031697661"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69766-1_1","type":"book-chapter","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:02:05Z","timestamp":1724612525000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient RNIC Cache Side-Channel Attack Detection Through DPU-Driven Architecture"],"prefix":"10.1007","author":[{"given":"Yunkun","family":"Liao","sequence":"first","affiliation":[]},{"given":"Jingya","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wenyan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,26]]},"reference":[{"key":"1_CR1","unstructured":"Bai, W., et\u00a0al.: Empowering azure storage with $$\\{$$RDMA$$\\}$$. In: 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2023), pp. 49\u201367 (2023)"},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/2534169.2486011","volume":"43","author":"P Bosshart","year":"2013","unstructured":"Bosshart, P., et al.: Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN. ACM SIGCOMM Comput. Commun. Rev. 43(4), 99\u2013110 (2013)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Burres, B., et\u00a0al.: Intel\u2019s hyperscale-ready infrastructure processing unit (ipu). In: 2021 IEEE Hot Chips 33 Symposium (HCS), pp. 1\u201316. IEEE (2021)","DOI":"10.1109\/HCS52781.2021.9567455"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Burstein, I.: Nvidia data center processing unit (dpu) architecture. In: 2021 IEEE Hot Chips 33 Symposium (HCS), pp. 1\u201320. IEEE (2021)","DOI":"10.1109\/HCS52781.2021.9567066"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Cooper, B.F., et\u00a0al.: Benchmarking cloud serving systems with ycsb. In: Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 143\u2013154 (2010)","DOI":"10.1145\/1807128.1807152"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Dastidar, J., et\u00a0al.: AMD 400g adaptive smartNIC SOC\u2013technology preview. In: IEEE Micro (2023)","DOI":"10.1109\/HCS55958.2022.9895577"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MM.2021.3058560","volume":"41","author":"M Galles","year":"2021","unstructured":"Galles, M., et al.: Pensando distributed services architecture. IEEE Micro 41(2), 43\u201349 (2021)","journal-title":"IEEE Micro"},{"key":"1_CR8","unstructured":"Gao, Y., et\u00a0al.: When cloud storage meets $$\\{$$RDMA$$\\}$$. In: 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2021), pp. 519\u2013533 (2021)"},{"key":"1_CR9","unstructured":"Gruss, D., et\u00a0al.: Cache template attacks: automating attacks on inclusive $$\\{$$Last-Level$$\\}$$ caches. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 897\u2013912 (2015)"},{"issue":"7","key":"1_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MC.2023.3261184","volume":"56","author":"T Hoefler","year":"2023","unstructured":"Hoefler, T., et al.: Data center ethernet and remote direct memory access: issues at hyperscale. Computer 56(7), 67\u201377 (2023)","journal-title":"Computer"},{"issue":"5","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TC.2021.3075765","volume":"71","author":"H Huang","year":"2021","unstructured":"Huang, H., et al.: Shuhai: a tool for benchmarking high bandwidth memory on FPGAs. IEEE Trans. Comput. 71(5), 1133\u20131144 (2021)","journal-title":"IEEE Trans. Comput."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Kim, T., et\u00a0al.: Devious: device-driven side-channel attacks on the iommu. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2288\u20132305. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179283"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Kurth, M., et\u00a0al.: Netcat: practical cache attacks from the network. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 20\u201338. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00082"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Lal, R., et\u00a0al.: Data processing unit\u2019s entry into confidential computing. In: Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, pp. 56\u201363 (2023)","DOI":"10.1145\/3623652.3623670"},{"key":"1_CR15","unstructured":"NVIDIA: Nvidia enterprise support portal (2024). https:\/\/enterprise-support.nvidia.com\/s\/article\/perftest-package. Accessed 23 Jan 2024"},{"key":"1_CR16","unstructured":"Reda, W., et\u00a0al.: $$\\{$$RDMA$$\\}$$ is turing complete, we just did not know it yet! In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2022), pp. 71\u201385 (2022)"},{"key":"1_CR17","unstructured":"Rothenberger, B., et\u00a0al.: $$\\{$$ReDMArk$$\\}$$: bypassing $$\\{$$RDMA$$\\}$$ security mechanisms. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 4277\u20134292 (2021)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Sabbagh, M., et\u00a0al.: SCADET: a side-channel attack detection tool for tracking prime-probe. In: 2018 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp.\u00a01\u20138. IEEE (2018)","DOI":"10.1145\/3240765.3240844"},{"key":"1_CR19","unstructured":"Taranov, K., et\u00a0al.: $$\\{$$sRDMA$$\\}$$\u2013efficient $$\\{$$NIC-based$$\\}$$ authentication and encryption for remote direct memory access. In: 2020 USENIX Annual Technical Conference (USENIX ATC 2020), pp. 691\u2013704 (2020)"},{"key":"1_CR20","unstructured":"Tsai, S.Y., et\u00a0al.: Pythia: remote oracles for the masses. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 693\u2013710 (2019)"},{"key":"1_CR21","unstructured":"Xing, J., et\u00a0al.: Bedrock: programmable network support for secure $$\\{$$RDMA$$\\}$$ systems. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 2585\u20132600 (2022)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2024: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69766-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:08:51Z","timestamp":1724612931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69766-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031697654","9783031697661"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69766-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.euro-par.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}