{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:39:10Z","timestamp":1769834350148,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976193","type":"print"},{"value":"9783031976209","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97620-9_10","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:30:46Z","timestamp":1752139846000},"page":"169-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The HMB Timing Side Channel: Exploiting the\u00a0SSD\u2019s Host Memory Buffer"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0569-1704","authenticated-orcid":false,"given":"Jonas","family":"Juffinger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0129-4073","authenticated-orcid":false,"given":"Hannes","family":"Weissteiner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7848-4248","authenticated-orcid":false,"given":"Thomas","family":"Steinbauer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"10_CR1","unstructured":"Bernstein, D.J.: Cache-Timing Attacks on AES (2005). http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Fratantonio, Y., Qian, C., Chung, S.P., Lee, W.: Cloak and dagger: from two permissions to complete control of the UI feedback loop. In: S &P (2017)","DOI":"10.1109\/SP.2017.39"},{"key":"10_CR3","unstructured":"Gabriel, F.: SSD Database (2025). https:\/\/www.techpowerup.com\/ssd-specs\/"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Giechaskiel, I., Tian, S., Szefer, J.: Cross-VM covert- and side-channel attacks in cloud FPGAs. ACM Trans. Reconfigurable Technol. Syst. (2022)","DOI":"10.1145\/3534972"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Gruss, D., et al.: Page cache attacks. In: CCS (2019)","DOI":"10.1145\/3319535.3339809"},{"key":"10_CR7","unstructured":"Herrmann, J., Zimmerman, Y., Parker, D., Radvan, S.: Red hat enterprise Linux 7 - virtualization tuning and optimization guide (2019)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Juffinger, J.: An analysis of HMB-based SSD Rowhammer. In: UASC (2025)","DOI":"10.46586\/uasc.2025.003"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Juffinger, J., Rauscher, F., La\u00a0Manna, G., Gruss, D.: Secret spilling drive: leaking user behavior through SSD contention. In: NDSS (2025)","DOI":"10.14722\/ndss.2025.230208"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Timing attacks on implementations of Diffe-Hellman, RSA, DSS, and other systems. In: CRYPTO (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"10_CR11","unstructured":"libvirt: Domain XML format (2025)"},{"key":"10_CR12","unstructured":"Linux: Fiemap (2024). https:\/\/docs.kernel.org\/filesystems\/fiemap.html"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: S &P (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"10_CR14","unstructured":"Liu, S., Kanniwadi, S., Schwarzl, M., Kogler, A., Gruss, D., Khan, S.: Side-channel attacks on optane persistent memory. In: USENIX Security (2023)"},{"key":"10_CR15","unstructured":"Mozilla: HTTP range requests | MDN (2 2025). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Range_requests"},{"key":"10_CR16","unstructured":"nginx: directio \u2014 Docs ngx_http_core_module (2025). https:\/\/nginx.org\/-en\/-docs\/-http\/-ngx_http_core_module.html#directio"},{"key":"10_CR17","unstructured":"NVM Express, Inc: NVM Express, rev 1.2.1 (2016)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: CT-RSA (2006)","DOI":"10.1007\/11605805_1"},{"key":"10_CR19","unstructured":"Pessl, P., Gruss, D., Maurice, C., Schwarz, M., Mangard, S.: DRAMA: exploiting DRAM addressing for cross-CPU attacks. In: USENIX Security (2016)"},{"key":"10_CR20","unstructured":"Rydstedt, G., Gourdin, B., Bursztein, E., Boneh, D.: Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks. In: 4th USENIX Conference on Offensive Technologies (2010)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Schwarzl, M., Borrello, P., Saileshwar, G., M\u00fcller, H., Schwarz, M., Gruss, D.: Practical timing side channel attacks on memory compression. In: S &P (2023)","DOI":"10.1109\/SP46215.2023.10179297"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Schwarzl, M., Kraft, E., Gruss, D.: Layered binary templating. In: ACNS (2023)","DOI":"10.1007\/978-3-031-33488-7_2"},{"key":"10_CR23","unstructured":"Song, L., et al.: The early bird catches the leak: unveiling timing side channels in LLM serving systems. arXiv (2024)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Trochatos, T., Etim, A., Szefer, J.: Covert-channels in FPGA-enabled SmartSSDs. ACM Trans. Reconfigurable Technol. Syst. (2023)","DOI":"10.1109\/ICFPT59805.2023.00064"},{"key":"10_CR25","unstructured":"Yarom, Y., Falkner, K.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security (2014)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97620-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:30:54Z","timestamp":1752139854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97620-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976193","9783031976209"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97620-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}