{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:29Z","timestamp":1773840209480,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319113784","type":"print"},{"value":"9783319113791","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11379-1_15","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T23:14:54Z","timestamp":1408490094000},"page":"299-319","source":"Crossref","is-referenced-by-count":131,"title":["Wait a Minute! A fast, Cross-VM Attack on AES"],"prefix":"10.1007","author":[{"given":"Gorka","family":"Irazoqui","sequence":"first","affiliation":[]},{"given":"Mehmet Sinan","family":"Inci","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"CFS Scheduler (April 2014), \n                    \n                      https:\/\/www.kernel.org\/doc\/Documentation\/scheduler\/sched-design-CFS.txt"},{"key":"15_CR2","unstructured":"Kernel Based Virtual Machine (April 2014), \n                    \n                      http:\/\/www.linux-kvm.org\/page\/Main_Page"},{"key":"15_CR3","unstructured":"Kernel Samepage Merging (April 2014), \n                    \n                      http:\/\/kernelnewbies.org\/Linux_2_6_32#head-d3f32e41df508090810388a57efce73f52660ccb\/"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O.: Yet Another MicroArchitectural Attack: Exploiting I-Cache. In: Proceedings of the 2007 ACM Workshop on Computer Security Architecture, CSAW 2007, pp. 11\u201318. ACM, New York (2007)","DOI":"10.1145\/1314466.1314469"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11935308_9","volume-title":"Information and Communications Security","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K.: Trace-driven cache attacks on AES (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 112\u2013121. Springer, Heidelberg (2006)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-38553-7_7","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"H. Aly","year":"2013","unstructured":"Aly, H., ElGayyar, M.: Attacking AES Using Bernstein\u2019s Attack on Modern Processors. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol.\u00a07918, pp. 127\u2013139. Springer, Heidelberg (2013)"},{"key":"15_CR7","unstructured":"Arcangeli, A., Eidus, I., Wright, C.: Increasing memory density by using KSM. In: Proceedings of the Linux Symposium, pp. 19\u201328 (2009)"},{"key":"15_CR8","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2004), \n                    \n                      http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"J. Bonneau","year":"2006","unstructured":"Bonneau, J., Mironov, I.: Cache-Collision Timing Attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 201\u2013215. Springer, Heidelberg (2006)"},{"key":"15_CR10","unstructured":"Brumley, D., Boneh, D.: Remote Timing Attacks are Practical. In: Proceedings of the 12th USENIX Security Symposium, pp. 1\u201314 (2003)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"15_CR12","unstructured":"Eidus, I., Dickins, H.: How to use the Kernel Samepage Merging feature (November 2009), \n                    \n                      https:\/\/www.kernel.org\/doc\/Documentation\/vm\/ksm.txt"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache Games \u2013 Bringing Access-Based Cache Attacks on AES to Practice. In: IEEE Symposium on Security and Privacy, pp. 490\u2013505 (2011)","DOI":"10.1109\/SP.2011.22"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/RISP.1992.213271","volume-title":"Proceedings of the 1992 IEEE Symposium on Security and Privacy, SP 1992","author":"W.-M. Hu","year":"1992","unstructured":"Hu, W.-M.: Lattice scheduling and covert channels. In: Proceedings of the 1992 IEEE Symposium on Security and Privacy, SP 1992, p. 52. IEEE Computer Society, Washington, DC (1992)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Fine grain Cross-VM Attacks on Xen and VMware are possible, \n                    \n                      https:\/\/eprint.iacr.org\/2014\/248.pdf","DOI":"10.1109\/BDCloud.2014.102"},{"issue":"2,3","key":"15_CR16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J. Kelsey","year":"2000","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur.\u00a08(2,3), 141\u2013158 (2000)","journal-title":"J. Comput. Secur."},{"key":"15_CR17","unstructured":"Neve, M.: Cache-based Vulnerabilities and SPAM analysis. Doctor thesis, UCL (2006)"},{"key":"15_CR18","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard. NIST FIPS PUB 197 (2001)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache Attacks and Countermeasures: The Case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"15_CR20","unstructured":"Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel (2002)"},{"key":"15_CR21","first-page":"199","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199\u2013212. ACM, New York (2009)"},{"issue":"1","key":"15_CR22","first-page":"215","volume":"96","author":"K. Suzaki","year":"2013","unstructured":"Suzaki, K., Iijima, K., Toshiki, Y., Artho, C.: Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines. Communications and Computer Sciences\u00a096(1), 215\u2013224 (2013)","journal-title":"Communications and Computer Sciences"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: Proceedings of the Fourth European Workshop on System Security, p. 1. ACM (2011)","DOI":"10.1145\/1972551.1972552"},{"key":"15_CR24","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Software side channel attack on memory deduplication. SOSP POSTER (2011)"},{"key":"15_CR25","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication"},{"key":"15_CR26","unstructured":"The OpenSSL Project. OpenSSL: The open source toolkit for SSL\/TLS (April 2003), \n                    \n                      http:\/\/www.openssl.org"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"15_CR28","unstructured":"VMware. Understanding Memory Resource Management in VMware vSphere 5.0, \n                    \n                      http:\/\/www.vmware.com\/files\/pdf\/mem_mgmt_perf_vsphere5.pdf"},{"issue":"SI","key":"15_CR29","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/844128.844146","volume":"36","author":"C.A. Waldspurger","year":"2002","unstructured":"Waldspurger, C.A.: Memory resource management in VMware ESX server. ACM SIGOPS Operating Systems Review\u00a036(SI), 181\u2013194 (2002)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lee, R.B.: Covert and side channels due to processor architecture. In: 22nd Annual Computer Security Applications Conference, ACSAC 2006, pp. 473\u2013482. IEEE (2006)","DOI":"10.1109\/ACSAC.2006.20"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-32946-3_23","volume-title":"Financial Cryptography and Data Security","author":"M. Wei\u00df","year":"2012","unstructured":"Wei\u00df, M., Heinz, B., Stumpf, F.: A Cache Timing Attack on AES in Virtualization Environments. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 314\u2013328. Springer, Heidelberg (2012)"},{"key":"15_CR32","unstructured":"Yarom, Y., Benger, N.: Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. Cryptology ePrint Archive, Report 2014\/140 (2014), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"15_CR33","unstructured":"Yarom, Y., Falkner, K.E.: Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. IACR Cryptology ePrint Archive, 448 (2013)"},{"key":"15_CR34","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/2382196.2382230","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"Y. Zhang","year":"2012","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM Side Channels and Their Use to Extract Private Keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 305\u2013316. ACM, New York (2012)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11379-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:32:05Z","timestamp":1558960325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11379-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113784","9783319113791"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11379-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}