{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:52:12Z","timestamp":1742914332604,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031800191"},{"type":"electronic","value":"9783031800207"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80020-7_1","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:02:29Z","timestamp":1734163349000},"page":"3-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Microarchitectural Security of\u00a0Firecracker VMM for\u00a0Serverless Cloud Platforms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8594-5390","authenticated-orcid":false,"given":"Zane","family":"Weissman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9018-4226","authenticated-orcid":false,"given":"Thore","family":"Tiemann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1116-6973","authenticated-orcid":false,"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5404-5368","authenticated-orcid":false,"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"1_CR1","unstructured":"Agache, A., et al.: Firecracker: lightweight virtualization for serverless applications. In: NSDI, pp. 419\u2013434. USENIX Association (2020)"},{"key":"1_CR2","unstructured":"Amazon Web Services: The Firecracker jailer (2021). f7886197. Accessed 05 July 2024"},{"key":"1_CR3","unstructured":"Amazon Web Services: AWS Lambda features (2023). https:\/\/aws.amazon.com\/lambda\/features\/. Accessed 05 July 2024"},{"key":"1_CR4","unstructured":"Amazon Web Services: Firecracker design (2023). 9c51dc68. Accessed 05 July 2024"},{"key":"1_CR5","unstructured":"Amazon Web Services: Production host setup recommendations (2023). 9ddeaf32. accessed 05 July 2024"},{"key":"1_CR6","unstructured":"Amazon Web Services: Production host setup recommendations (2024). 8a1719fe. Accessed 05 July 2024"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Balasubramanian, A., Baranowski, M.S., Burtsev, A., Panda, A., Rakamaric, Z., Ryzhyk, L.: System programming in rust: beyond safety. In: HotOS, pp. 156\u2013161. ACM (2017)","DOI":"10.1145\/3102980.3103006"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Brenner, S., Kapitza, R.: Trust more, serverless. In: SYSTOR, pp. 33\u201343. ACM (2019)","DOI":"10.1145\/3319647.3325825"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Canella, C., et al.: Fallout: leaking data on meltdown-resistant CPUs. In: CCS, pp. 769\u2013784. ACM (2019)","DOI":"10.1145\/3319535.3363219"},{"key":"1_CR10","unstructured":"Canella, C., et al.: A systematic evaluation of transient execution attacks and defenses. In: USENIX Security Symposium, pp. 249\u2013266. USENIX Association (2019)"},{"key":"1_CR11","unstructured":"Dolez\u0306elov\u00e1, M., et al.: Red hat enterprise linux 7 resource management guide\u2013using cgroups to manage system resources on RHEL. Red Hat, Inc (2020). Accessed 05 July 2024"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Fustos, J., Bechtel, M.G., Yun, H.: SpectreRewind: leaking secrets to past instructions. In: ASHES@CCS, pp. 117\u2013126. ACM (2020)","DOI":"10.1145\/3411504.3421216"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-62105-0_11","volume-title":"Engineering Secure Software and Systems","author":"D Gruss","year":"2017","unstructured":"Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C., Mangard, S.: KASLR is dead: long live KASLR. In: Bodden, E., Payer, M., Athanasopoulos, E. (eds.) ESSoS 2017. LNCS, vol. 10379, pp. 161\u2013176. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62105-0_11"},{"key":"1_CR14","unstructured":"Gupta, P.: TAA - TSX Asynchronous Abort. The Linux Kernel Organization (2020). https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/hw-vuln\/tsx_async_abort.html. Accessed 05 July 2024"},{"key":"1_CR15","unstructured":"Hicks, T.: MDS - Microarchitectural Data Sampling. The Linux Kernel Organization (2019). https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/hw-vuln\/mds.html. Accessed 05 July 2024"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Holmes, B., Waterman, J., Williams, D.: KASLR in the age of MicroVMs. In: EuroSys, pp. 149\u2013165. ACM (2022)","DOI":"10.1145\/3492321.3519578"},{"key":"1_CR17","unstructured":"Horn, J.: Speculative execution, variant 4: speculative store bypass (2018). https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1528. Accessed 05 July 2024"},{"key":"1_CR18","unstructured":"Intel: Speculative Execution Side Channel Mitigations (2018). rev. 3.0"},{"key":"1_CR19","unstructured":"Intel: Intel transactional synchronization extensions (Intel TSX) asynchronous abort. Technical report (2019). doc. ID: 758370. Accessed 05 July 2024"},{"key":"1_CR20","unstructured":"Intel: Microarchitectural data sampling. Technical report (2019). doc. ID: 758366, ver. 3.0. Accessed 05 July 2024"},{"key":"1_CR21","unstructured":"Intel: Vector register sampling. Technical report (2020). doc. ID: 660231. Accessed 05 July 2024"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Johannesmeyer, B., Koschel, J., Razavi, K., Bos, H., Giuffrida, C.: Kasper: scanning for generalized transient execution gadgets in the linux kernel. In: NDSS. The Internet Society (2022)","DOI":"10.14722\/ndss.2022.24221"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Khasawneh, K.N., Koruyeh, E.M., Song, C., Evtyushkin, D., Ponomarev, D., Abu-Ghazaleh, N.B.: SafeSpec: banishing the Spectre of a Meltdown with leakage-free speculation. In: DAC, p.\u00a060. ACM (2019)","DOI":"10.1145\/3316781.3317903"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Kiriansky, V., Lebedev, I.A., Amarasinghe, S.P., Devadas, S., Emer, J.S.: DAWG: a defense against cache timing attacks in speculative execution processors. In: MICRO, pp. 974\u2013987. IEEE Computer Society (2018)","DOI":"10.1109\/MICRO.2018.00083"},{"key":"1_CR25","unstructured":"Kiriansky, V., Waldspurger, C.A.: Speculative buffer overflows: attacks and defenses. CoRR arxiv:1807.03757 (2018)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: IEEE Symposium on Security and Privacy, pp. 1\u201319. IEEE (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"1_CR27","unstructured":"Koruyeh, E.M., Khasawneh, K.N., Song, C., Abu-Ghazaleh, N.B.: Spectre Returns! speculation attacks using the return stack buffer. In: WOOT @ USENIX Security Symposium. USENIX Association (2018)"},{"key":"1_CR28","unstructured":"Li, L., Yavarzadeh, H., Tullsen, D.: Indirector: high-precision branch target injection attacks exploiting the indirect branch predictor. In: USENIX Security Symposium (to appear). USENIX Association (2024)"},{"key":"1_CR29","unstructured":"Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: USENIX Security Symposium, pp. 973\u2013990. USENIX Association (2018)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Maisuradze, G., Rossow, C.: ret2spec: speculative execution using return stack buffers. In: CCS, pp. 2109\u20132122. ACM (2018)","DOI":"10.1145\/3243734.3243761"},{"issue":"1","key":"1_CR31","first-page":"4","volume":"6","author":"DT Marr","year":"2002","unstructured":"Marr, D.T., et al.: Hyper-threading technology architecture and microarchitecture. Intel Technol. J. 6(1), 4\u201315 (2002)","journal-title":"Intel Technol. J."},{"key":"1_CR32","unstructured":"Moghimi, D., Lipp, M., Sunar, B., Schwarz, M.: Medusa: microarchitectural data leakage via automated attack synthesis. In: USENIX Security Symposium, pp. 1427\u20131444. USENIX Association (2020)"},{"key":"1_CR33","unstructured":"Moghimi, D., Sunar, B., Eisenbarth, T., Heninger, N.: TPM-FAIL: TPM meets timing and lattice attacks. In: USENIX Security Symposium, pp. 2057\u20132073. USENIX Association (2020)"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"1_CR35","unstructured":"Parkegren, A., Veltman, M.: Trust in lightweight virtual machines: integrating TPMs into Firecracker. Chalmers University of Technology, University of Gothenburg, master thesis (2023)"},{"key":"1_CR36","unstructured":"Ragab, H., Barberis, E., Bos, H., Giuffrida, C.: Rage against the machine clear: a systematic analysis of machine clears and their implications for transient execution attacks. In: USENIX Security Symposium, pp. 1451\u20131468. USENIX Association (2021)"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Botvinnik, M., Oren, Y.: Port contention goes portable: port contention side channels in web browsers. In: AsiaCCS, pp. 1182\u20131194. ACM (2022)","DOI":"10.1145\/3488932.3517411"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Schwarz, M.: CPU port contention without SMT. In: ESORICS (3). LNCS, vol. 13556, pp. 209\u2013228. Springer, Heidelberg (2022)","DOI":"10.1007\/978-3-031-17143-7_11"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"van Schaik, S., et al.: RIDL: rogue in-flight data load. In: IEEE Symposium on Security and Privacy, pp. 88\u2013105. IEEE (2019)","DOI":"10.1109\/SP.2019.00087"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Schwarz, M., et al.: ZombieLoad: cross-privilege-boundary data sampling. In: CCS, pp. 753\u2013768. ACM (2019)","DOI":"10.1145\/3319535.3354252"},{"key":"1_CR41","unstructured":"Turner, P.: Retpoline: a software construct for preventing branch-target-injection (2018). https:\/\/support.google.com\/faqs\/answer\/7625886. Accessed 05 July 2024"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., et al.: LVI: hijacking transient execution through microarchitectural load value injection. In: IEEE Symposium on Security and Privacy, pp. 54\u201372. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00089"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., Piessens, F., Strackx, R.: SGX-step: a practical attack framework for precise enclave execution control. In: SysTEX@SOSP, pp. 4:1\u20134:6. ACM (2017)","DOI":"10.1145\/3152701.3152706"},{"key":"1_CR44","unstructured":"Wikner, J., Razavi, K.: RETBLEED: arbitrary speculative code execution with return instructions. In: USENIX Security Symposium, pp. 3825\u20133842. USENIX Association (2022)"},{"key":"1_CR45","unstructured":"Xiao, J., et al.: Attacks are forwarded: breaking the isolation of microVM-based containers through operation forwarding. In: USENIX Security Symposium, pp. 7517\u20137534. USENIX Association (2023)"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Yan, M., Choi, J., Skarlatos, D., Morrison, A., Fletcher, C.W., Torrellas, J.: InvisiSpec: making speculative execution invisible in the cache hierarchy. In: MICRO, pp. 428\u2013441. IEEE Computer Society (2018)","DOI":"10.1109\/MICRO.2018.00042"},{"key":"1_CR47","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security Symposium, pp. 719\u2013732. USENIX Association (2014)"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Yavarzadeh, H., et al.: Pathfinder: high-resolution control-flow attacks exploiting the conditional branch predictor. In: ASPLOS (3), pp. 770\u2013784. ACM (2024)","DOI":"10.1145\/3620666.3651382"},{"key":"1_CR49","unstructured":"Young, E.G., Zhu, P., Caraza-Harter, T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: The true cost of containing: a gVisor case study. In: HotCloud. USENIX Association (2019)"},{"key":"1_CR50","unstructured":"Zhao, S., Xu, P., Chen, G., Zhang, M., Zhang, Y., Lin, Z.: Reusable enclaves for confidential serverless computing. In: USENIX Security Symposium, pp. 4015\u20134032. USENIX Association (2023)"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Zhao, Z.N., Morrison, A., Fletcher, C.W., Torrellas, J.: Last-level cache side-channel attacks are feasible in the modern public cloud. In: ASPLOS (2), pp. 582\u2013600. ACM (2024)","DOI":"10.1145\/3620665.3640403"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80020-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:02:48Z","timestamp":1734163368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80020-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9783031800191","9783031800207"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80020-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}