{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:56:28Z","timestamp":1770814588161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032163417","type":"print"},{"value":"9783032163424","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16342-4_8","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:24Z","timestamp":1770800304000},"page":"134-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GhostWriter: Exploiting GPU-Cache Contention to\u00a0Steal and\u00a0Steer Multi-tenant Large-Language-Model Inference"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7550-2641","authenticated-orcid":false,"given":"Satyajit","family":"Das","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2289-0924","authenticated-orcid":false,"given":"Sreenath","family":"Vijayakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"8_CR1","unstructured":"Black, S., Gao, L., Wang, P., Leahy, C., Biderman, S.: GPT-neo: large scale autoregressive language modeling with mesh tensorflow (2021). https:\/\/github.com\/EleutherAI\/gpt-neo. Software and model release by EleutherAI"},{"key":"8_CR2","unstructured":"Brown, T.B., et al.: Language models are few-shot learners. Adv. Neural Inf. Process. Syst. (NeurIPS) 33, 1877\u20131901 (2020). https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/1457c0d6bfcb4967418bfb8ac142f64a-Abstract.html"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s41635-019-00070-7","volume":"3","author":"CN Chen","year":"2019","unstructured":"Chen, C.N., Yen, S.M.: Side-channel timing attack of RSA on a GPU. J. Hardw. Syst. Secur. 3, 281\u2013295 (2019). https:\/\/doi.org\/10.1007\/s41635-019-00070-7","journal-title":"J. Hardw. Syst. Secur."},{"key":"8_CR4","unstructured":"Hugging Face: Text Generation Inference. https:\/\/github.com\/huggingface\/text-generation-inference. Accessed 01 Aug 2025"},{"key":"8_CR5","unstructured":"Jattke, P., et al.: Zenhammer: Rowhammer attacks on AMD Zen-based platforms. In: 33rd USENIX Security Symposium (USENIX Security 2024). USENIX Association (2024). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/jattke"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Kwon, W., et al.: Efficient memory management for large language model serving with pagedattention. In: Proceedings of the 29th Symposium on Operating Systems Principles (SOSP 2023), pp. 611\u2013626 (2023). https:\/\/doi.org\/10.1145\/3600006.3613165","DOI":"10.1145\/3600006.3613165"},{"key":"8_CR8","unstructured":"Liu, Y., et al.: RoBERTa: a robustly optimized BERT pretraining approach. arXiv preprint arXiv:1907.11692 (2019). https:\/\/arxiv.org\/abs\/1907.11692. This entry is for RoBERTa. The SST-2 dataset itself is from Socher et al. (2013) EMNLP: \u201cRecursive Deep Models for Semantic Compositionality Over a Sentiment Treebank\u201d. You may want to cite both if being very specific about the fine-tuning setup"},{"key":"8_CR9","unstructured":"Merity, S., Xiong, C., Bradbury, J., Socher, R.: Pointer sentinel mixture models. In: International Conference on Learning Representations (ICLR) (2017). https:\/\/arxiv.org\/abs\/1609.07843"},{"key":"8_CR10","unstructured":"NVIDIA: NVIDIA A100 Tensor Core GPU Architecture. https:\/\/www.nvidia.com\/content\/dam\/en-zz\/Solutions\/Data-Center\/nvidia-ampere-architecture-whitepaper.pdf. Accessed 01 Aug 2025"},{"key":"8_CR11","unstructured":"NVIDIA: NVIDIA Multi-Instance GPU. https:\/\/www.nvidia.com\/en-us\/technologies\/multi-instance-gpu\/. Accessed 01 Aug 2025"},{"key":"8_CR12","unstructured":"NVIDIA: NVIDIA Triton Inference Server. https:\/\/developer.nvidia.com\/triton-inference-server. Accessed 01 Aug 2025"},{"key":"8_CR13","unstructured":"Pope, R., et al.: Efficiently scaling transformer inference. arXiv preprint arXiv:2211.05102 (2023). https:\/\/arxiv.org\/abs\/2211.05102"},{"key":"8_CR14","unstructured":"Raffel, C., et al.: Exploring the limits of transfer learning with a unified text-to-text transformer. J. Mach. Learn. Res. (JMLR) 21(140), 1\u201367 (2020). http:\/\/jmlr.org\/papers\/v21\/20-074.html"},{"key":"8_CR15","unstructured":"Shen, X., Qu, Y., Backes, M., Zhang, Y.: Prompt stealing attacks against text-to-image generation models. In: 32nd USENIX Security Symposium (USENIX Security 2024). USENIX Association (2024). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/shen-xinyue"},{"key":"8_CR16","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems 30 (NIPS 2017), pp. 5998\u20136008 (2017). https:\/\/papers.nips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html"},{"key":"8_CR17","unstructured":"Zhang, X., Zhao, J.J., LeCun, Y.: Character-level convolutional networks for text classification. In: Advances in Neural Information Processing Systems 28 (NIPS 2015), pp. 649\u2013657 (2015). https:\/\/papers.nips.cc\/paper\/2015\/hash\/250cf8b51c773f3f8dc8b4be867a9a02-Abstract.html"},{"key":"8_CR18","unstructured":"Zou, A., Wang, Z., Carlini, N., Nasr, M., Kolter, J.Z., Fredrikson, M.: Universal and transferable adversarial attacks on aligned language models. arXiv preprint arXiv:2307.15043 (2023). https:\/\/arxiv.org\/abs\/2307.15043"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16342-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:36Z","timestamp":1770800316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16342-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032163417","9783032163424"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16342-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guwahati","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.iitg.ac.in\/space2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}