{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:06:45Z","timestamp":1750392405900,"version":"3.41.0"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957635","type":"print"},{"value":"9783031957642","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95764-2_1","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:44:59Z","timestamp":1750315499000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Not So Secure TSC"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0569-1704","authenticated-orcid":false,"given":"Jonas","family":"Juffinger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4845-868X","authenticated-orcid":false,"given":"Sudheendra Raghav","family":"Neela","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Alder, F., Scopelliti, G., Van\u00a0Bulck, J., M\u00fchlberg, J.T.: About time: on the challenges of temporal guarantees in untrusted environments. In: SysTEX (2023)","DOI":"10.1145\/3578359.3593038"},{"key":"1_CR2","unstructured":"Amazon AWS: AMD SEV-SNP Considerations (2024). https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/sev-snp.html"},{"key":"1_CR3","unstructured":"Amazon AWS: The EC2 approach to preventing side-channels (2024). https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/security-design-of-aws-nitro-system\/the-ec2-approach-to-preventing-side-channels.html"},{"key":"1_CR4","unstructured":"AMD: AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More (2020). https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/epyc-business-docs\/white-papers\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf"},{"key":"1_CR5","unstructured":"AMD: AMD64 Architecture Programmer\u2019s Manual (2023)"},{"key":"1_CR6","unstructured":"AMD: SEV Secure Nested Paging Firmware ABI Specification (2023)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Anwar, F.M., Garcia, L., Han, X., Srivastava, M.: Securing time in untrusted operating systems with timeseal. In: RTSS (2019)","DOI":"10.1109\/RTSS46320.2019.00018"},{"key":"1_CR8","unstructured":"ARM: Security technology building a secure system using trustzone technology (2009). https:\/\/developer.arm.com\/documentation\/PRD29-GENC-009492\/c\/TrustZone-Hardware-Architecture"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10207-013-0210-0","volume":"13","author":"A Bates","year":"2014","unstructured":"Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., Butler, K.: On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Secur. 13, 171\u2013189 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Betz, J., Westhoff, D., M\u00fcller, G.: Survey on covert channels in virtual machines and cloud computing. Trans. Emerg. Telecommun. Technol. (2016)","DOI":"10.1002\/ett.3134"},{"key":"1_CR11","unstructured":"Brasser, F., M\u00fcller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.R.: Software grand exposure: SGX cache attacks are practical. In: WOOT (2017)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z., Lai, T.H.: SgxPectre attacks: stealing intel secrets from SGX enclaves via speculative execution. In: EuroS &P (2019)","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Chen, S., Zhang, X., Reiter, M.K., Zhang, Y.: Detecting privileged side-channel attacks in shielded execution with D\u00e9J\u00e0 Vu. In: AsiaCCS (2017)","DOI":"10.1145\/3052973.3053007"},{"key":"1_CR14","unstructured":"Cisco Systems Inc.: Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide for C22 M3, C24 M3, C220 M3 and C240 M3 Servers, Release 3.0 (2024). https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/unified_computing\/ucs\/c\/sw\/gui\/config\/guide\/3_0\/b_Cisco_UCS_C-series_GUI_Configuration_Guide_301\/b_Cisco_UCS_C-series_GUI_Configuration_Guide_201_chapter_011.html#d71727e3886a1635"},{"key":"1_CR15","unstructured":"Costan, V., Devadas, S.: Intel SGX Explained. Cryptology ePrint Archive, Report 2016\/086 (2016)"},{"key":"1_CR16","unstructured":"Dadhania, N.A.: [PATCH v7 00\/16] Add Secure TSC support for SNP guests (2023). https:\/\/lore.kernel.org\/all\/20231220151358.2147066-1-nikunj@amd.com\/"},{"key":"1_CR17","unstructured":"Dadhania, N.A.: SecureTSC Hypervisor Patches (2023). https:\/\/github.com\/nikunjad\/linux\/tree\/snp-host-latest-securetsc_v5"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: TEE: a virtual DRTM based execution environment for secure cloud-end computing. In: CCS (2010)","DOI":"10.1145\/1866307.1866390"},{"key":"1_CR19","unstructured":"Du, Z.H., et al.: Secure encrypted virtualization is unsecure. arXiv:1712.05090 (2017)"},{"key":"1_CR20","unstructured":"Ge, X., Vijayakumar, H., Jaeger, T.: Sprobes: enforcing kernel code integrity on the trustzone architecture. In: Workshop on Mobile Security Technologies (MoST) (2014)"},{"key":"1_CR21","unstructured":"Google: Confidential Computing concepts (2024). https:\/\/cloud.google.com\/confidential-computing\/confidential-vm\/docs\/confidential-vm-overview"},{"key":"1_CR22","unstructured":"Google: Confidential Computing: Supported configurations (2024). https:\/\/cloud.google.com\/confidential-computing\/confidential-vm\/docs\/supported-configurations"},{"issue":"7","key":"1_CR23","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/3140607.3050763","volume":"52","author":"F Hetzelt","year":"2017","unstructured":"Hetzelt, F., Buhren, R.: Security analysis of encrypted virtual machines. ACM SIGPLAN Not. 52(7), 129\u2013142 (2017)","journal-title":"ACM SIGPLAN Not."},{"key":"1_CR24","unstructured":"HP: Setting the power-on delay (2024). https:\/\/support.hpe.com\/hpesc\/public\/docDisplay?docId=sd00001068en_us&page=GUID-D7147C7F-2016-0901-0A72-000000000D92.html"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Inci, M.S., Gulmezoglu, B., Eisenbarth, T., Sunar, B.: Co-location detection on the cloud. In: COSADE (2016)","DOI":"10.1007\/978-3-319-43283-0_2"},{"key":"1_CR26","unstructured":"Inci, M.S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., Sunar, B.: Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. Cryptology ePrint Archive, Report 2015\/898 (2015)"},{"key":"1_CR27","unstructured":"Intel: Intel Trust Domain Extensions (2023). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/documentation.html"},{"key":"1_CR28","unstructured":"Intel: Intel 64 and IA-32 Architectures Software Developer\u2019s Manual, Volume 3 (3A, 3B & 3C): System Programming Guide (2024)"},{"key":"1_CR29","unstructured":"Intel: Intel Trust Domain Extensions Module Base Architecture Specification (2024). https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/documentation.html"},{"key":"1_CR30","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Cross-VM side channels and their use to extract private keys. In: Big Data and Cloud Computing (2014)"},{"key":"1_CR31","unstructured":"Kalmbach, M., Gottschlag, M., Schmidt, T., Bellosa, F.: TurboCC: a practical frequency-based covert channel with intel turbo boost. arXiv:2007.07046 (2020)"},{"key":"1_CR32","unstructured":"Kaplan, D., Powell, J., Woller, T.: AMD Memory Encryption (2016)"},{"key":"1_CR33","unstructured":"Kim, T., Peinado, M., Mainar-Ruiz, G.: StealthMem: system-level protection against cache-based side channel attacks in the cloud. In: USENIX Security (2012)"},{"key":"1_CR34","unstructured":"Kogler, A., et al.: Collide+Power: leaking inaccessible data with software-based power side channels. In: USENIX Security (2023)"},{"key":"1_CR35","unstructured":"Lee, J., et al.: Hacking in darkness: return-oriented programming against secure enclaves. In: USENIX Security (2017)"},{"key":"1_CR36","unstructured":"Lendacky, T.: QEMU not working with virt-install (2022). https:\/\/github.com\/AMDESE\/qemu\/issues\/3#issuecomment-1171302037"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Li, M., Wilke, L., Wichelmann, J., Eisenbarth, T., Teodorescu, R., Zhang, Y.: A systematic look at ciphertext side channels on AMD SEV-SNP. In: S &P (2022)","DOI":"10.1109\/SP46214.2022.9833768"},{"key":"1_CR38","unstructured":"Li, M., Zhang, Y., Lin, Z., Solihin, Y.: Exploiting unprotected $$\\{$$I\/O$$\\}$$ operations in $$\\{$$AMD\u2019s$$\\}$$ secure encrypted virtualization. In: USENIX Security (2019)"},{"key":"1_CR39","unstructured":"Li, M., Zhang, Y., Wang, H., Li, K., Cheng, Y.: CIPHERLEAKS: breaking constant-time cryptography on AMD SEV via the ciphertext side channel. In: USENIX Security (2021)"},{"key":"1_CR40","unstructured":"Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., Mangard, S.: ARMageddon: cache attacks on mobile devices. In: USENIX Security (2016)"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Lipp, M., et al.: PLATYPUS: software-based power side-channel attacks on x86. In: S &P (2021)","DOI":"10.1109\/SP40001.2021.00063"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Liu, F., et al.: Catalyst: defeating last-level cache side channel attacks in cloud computing. In: HPCA (2016)","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Makrani, H.M., et al.: Cloak & co-locate: adversarial railroading of resource sharing-based attacks on the cloud. In: Secure and Private Execution Environment Design (SEED) (2021)","DOI":"10.1109\/SEED51797.2021.00011"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Maurice, C., et al.: Hello from the other side: SSH over robust cache covert channels in the cloud. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23294"},{"key":"1_CR45","unstructured":"Miller, R.: Inside Amazon\u2019s Cloud Computing Infrastructure (2015). https:\/\/www.datacenterfrontier.com\/design\/article\/11431484\/inside-amazon8217s-cloud-computing-infrastructure"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Mills, D., et\u00a0al.: Network time protocol. Technical report, RFC-958, M\/A-COM Linkabit (1985)","DOI":"10.17487\/rfc0958"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Morbitzer, M., Huber, M., Horsch, J., Wessel, S.: Severed: subverting AMD\u2019s virtual machine encryption. In: EuroSec (2018)","DOI":"10.1145\/3193111.3193112"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Morbitzer, M., Proskurin, S., Radev, M., Dorfhuber, M.: SEVerity: code injection attacks against encrypted virtual machines. In: WOOT (2021)","DOI":"10.1109\/SPW53761.2021.00063"},{"key":"1_CR49","unstructured":"Oleksenko, O., Trach, B., Krahn, R., Silberstein, M., Fetzer, C.: Varys: protecting SGX enclaves from practical side-channel attacks. In: USENIX ATC (2018)"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Pfarr, F., Buckel, T., Winkelmann, A.: Cloud computing data protection \u2013 a literature review and analysis. In: HICSS (2014)","DOI":"10.1109\/HICSS.2014.616"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Qiu, P., Wang, D., Lyu, Y., Qu, G.: VoltJockey: breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies. In: CCS (2019)","DOI":"10.1145\/3319535.3354201"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Ryan, K.: Hardware-backed heist: extracting ECDSA keys from Qualcomm\u2019s TrustZone. In: CCS (2019)","DOI":"10.1145\/3319535.3354197"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Gruss, D., Weiser, S., Maurice, C., Mangard, S.: Malware guard extension: using SGX to conceal cache attacks. In: DIMVA (2017)","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Schwarz, M., et al.: ZombieLoad: cross-privilege-boundary data sampling. In: CCS (2019)","DOI":"10.1145\/3319535.3354252"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Weiser, S., Gruss, D.: Practical enclave malware with intel SGX. In: DIMVA (2019)","DOI":"10.1007\/978-3-030-22038-9_9"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Weiser, S., Gruss, D., Maurice, C., Mangard, S.: Malware guard extension: using SGX to conceal cache attacks. In: DIMVA (2017)","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Shringarputale, S., McDaniel, P., Butler, K., La\u00a0Porta, T.: Co-residency attacks on containers are real. In: CCSW (2020)","DOI":"10.1145\/3411495.3421357"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Sule, M.J., Li, M., Taylor, G.: Trust modeling in cloud computing. In: SOSE (2016)","DOI":"10.1109\/SOSE.2016.32"},{"key":"1_CR60","doi-asserted-by":"crossref","unstructured":"Sullivan, D., Arias, O., Meade, T., Jin, Y.: Microarchitectural minefields: 4K-aliasing covert channel and multi-tenant detection in IaaS clouds. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23221"},{"key":"1_CR61","unstructured":"Van\u00a0Bulck, J., et al.: Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution. In: USENIX Security (2018)"},{"key":"1_CR62","doi-asserted-by":"crossref","unstructured":"Van\u00a0Bulck, J., et al.: LVI: hijacking transient execution through microarchitectural load value injection. In: S &P (2020)","DOI":"10.1109\/SP40000.2020.00089"},{"key":"1_CR63","unstructured":"Varadarajan, V., Zhang, Y., Ristenpart, T., Swift, M.: A placement vulnerability study in multi-tenant public clouds. In: USENIX Security (2015)"},{"key":"1_CR64","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, M., Zhang, Y., Lin, Z.: PwrLeak: exploiting power reporting interface for side-channel attacks on AMD SEV. In: DIMVA (2023)","DOI":"10.1007\/978-3-031-35504-2_3"},{"key":"1_CR65","doi-asserted-by":"crossref","unstructured":"Weichbrodt, N., Kurmus, A., Pietzuch, P., Kapitza, R.: AsyncShock: exploiting synchronisation bugs in intel SGX enclaves. In: ESORICS (2016)","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"1_CR66","doi-asserted-by":"crossref","unstructured":"Werner, J., Mason, J., Antonakakis, M., Polychronakis, M., Monrose, F.: The severest of them all: inference attacks against secure virtual enclaves. In: AsiaCCS (2019)","DOI":"10.1145\/3321705.3329820"},{"key":"1_CR67","doi-asserted-by":"crossref","unstructured":"Wilke, L., Wichelmann, J., Morbitzer, M., Eisenbarth, T.: SEVurity: no security without integrity\u2013breaking integrity-free memory encryption with minimal assumptions. In: S &P (2020)","DOI":"10.1109\/SP40000.2020.00080"},{"key":"1_CR68","unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In: USENIX Security (2012)"},{"key":"1_CR69","doi-asserted-by":"crossref","unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud. ACM Trans. Netw. (2014)","DOI":"10.1109\/TNET.2014.2304439"},{"key":"1_CR70","doi-asserted-by":"crossref","unstructured":"Yan, M., Sprabery, R., Gopireddy, B., Fletcher, C., Campbell, R., Torrellas, J.: Attack directories, not caches: side channel attacks in a non-inclusive world. In: S &P (2019)","DOI":"10.1109\/SP.2019.00004"},{"key":"1_CR71","unstructured":"Zhang, N., Sun, K., Shands, D., Lou, W., Hou, Y.T.: TruSpy: cache side-channel information leakage from the secure world on ARM devices. IACR Cryptology ePrint Archive, Report 2016\/980 (2016)"},{"key":"1_CR72","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhang, Y., Lee, R.B.: CloudRadar: a real-time side-channel attack detection system in clouds. In: RAID (2016)","DOI":"10.1007\/978-3-319-45719-2_6"},{"key":"1_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Oprea, A., Reiter, M.K.: HomeAlone: co-residency detection in the cloud via side-channel analysis. In: S &P (2011)","DOI":"10.1109\/SP.2011.31"},{"key":"1_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-tenant side-channel attacks in PaaS clouds. In: CCS (2014)","DOI":"10.1145\/2660267.2660356"},{"key":"1_CR75","doi-asserted-by":"crossref","unstructured":"Zhao, Z.N., Morrison, A., Fletcher, C.W., Torrellas, J.: Everywhere all at once: co-location attacks on public cloud FaaS. In: ASPLOS (2024)","DOI":"10.1145\/3617232.3624867"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95764-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:45:25Z","timestamp":1750315525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95764-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957635","9783031957642"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95764-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}