{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:49Z","timestamp":1763507689614,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319214757"},{"type":"electronic","value":"9783319214764"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21476-4_8","type":"book-chapter","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T16:08:07Z","timestamp":1437062887000},"page":"111-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Faster and More Realistic Flush+Reload Attack on AES"],"prefix":"10.1007","author":[{"given":"Berk","family":"G\u00fclmezo\u011flu","sequence":"first","affiliation":[]},{"given":"Mehmet Sinan","family":"\u0130nci","sequence":"additional","affiliation":[]},{"given":"Gorka","family":"Irazoqui","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,17]]},"reference":[{"unstructured":"Amazon EC2 Instances. http:\/\/aws.amazon.com\/ec2\/instance-types\/","key":"8_CR1"},{"unstructured":"Google Compute Engine Instance Types. https:\/\/cloud.google.com\/compute\/docs\/machine-types","key":"8_CR2"},{"unstructured":"CFS scheduler, April 2014. https:\/\/www.kernel.org\/doc\/Documentation\/scheduler\/sched-design-CFS.txt","key":"8_CR3"},{"unstructured":"Kernel Samepage Merging, April 2014. http:\/\/kernelnewbies.org\/Linux_2_6_32#head-d3f32e41df508090810388a57efce73f52660ccb\/","key":"8_CR4"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11935308_9","volume-title":"Information and Communications Security","author":"O Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K.: Trace-driven cache attacks on AES (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 112\u2013121. Springer, Heidelberg (2006)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-662-44709-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"N Benger","year":"2014","unstructured":"Benger, N., van de Pol, J., Smart, N.P., Yarom, Y.: \u201cOoh Aah.. Just a Little Bit\u201d : a small amount of side channel can go a long way. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 75\u201392. Springer, Heidelberg (2014)"},{"unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2004). http:\/\/cr.yp.to\/papers.html#cachetiming","key":"8_CR7"},{"unstructured":"Bonneau, J.: Robust final-round cache-trace attacks against AES. IACR Cryptology ePrint Archive 2006\/374 (2006)","key":"8_CR8"},{"unstructured":"Cai-Sen, C., Tao, W., Xiao-Cen, C., Ping, Z.: An Improved trace driven instruction cache timing attack on RSA. Cryptology ePrint Archive, Report 2011\/557 (2011). http:\/\/eprint.iacr.org\/","key":"8_CR9"},{"unstructured":"Labovitz, C.: How big is amazons cloud? (2012). http:\/\/www.deepfield.com\/2012\/04\/how-big-is-amazons-cloud\/","key":"8_CR10"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/10721064_15","volume-title":"Smart Card Research and Applications","author":"J-F Dhem","year":"2000","unstructured":"Dhem, J.-F., Koeune, F., Leroux, P.-A., Mestr\u00e9, P., Quisquater, J.-J., Willems, J.-L.: A practical implementation of the timing attack. In: Quisquater, J.-J., Schneier, B. (eds.) CARDIS 2000. LNCS, vol. 1820, pp. 167\u2013182. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games - bringing access-based cache attacks on AES to practice. In: IEEE Symposium on Security and Privacy, pp. 490\u2013505 (2011)","key":"8_CR12","DOI":"10.1109\/SP.2011.22"},{"doi-asserted-by":"crossref","unstructured":"Hu, W.-M.: Lattice scheduling and covert channels. In: Proceedings of the 1992 IEEE Symposium on Security and Privacy, SP 1992, Washington, DC, USA, pp. 52\u201361. IEEE Computer Society (1992)","key":"8_CR13","DOI":"10.1109\/RISP.1992.213271"},{"doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Fine grain cross-VM attacks on xen and vmware are possible! Cryptology ePrint Archive, Report 2014\/248 (2014). http:\/\/eprint.iacr.org\/","key":"8_CR14","DOI":"10.1109\/BDCloud.2014.102"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-319-11379-1_15","volume-title":"Research in Attacks, Intrusions and Defenses","author":"G Irazoqui","year":"2014","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! a fast, cross-VM attack on AES. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 299\u2013319. Springer, Heidelberg (2014)"},{"unstructured":"Jones, M.T.: Inside the linux 2.6 completely fair scheduler, December 2009. http:\/\/www.ibm.com\/developerworks\/library\/l-completely-fair-scheduler\/l-completely-fair-scheduler-pdf.pdf","key":"8_CR16"},{"unstructured":"Jones, M.T.: Anatomy of linux kernel shared memory, April 2010. http:\/\/www.ibm.com\/developerworks\/linux\/library\/l-kernel-shared-memory\/l-kernel-shared-memory-pdf.pdf\/","key":"8_CR17"},{"issue":"2\u20133","key":"8_CR18","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J Kelsey","year":"2000","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8(2\u20133), 141\u2013158 (2000)","journal-title":"J. Comput. Secur."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"8_CR21","volume-title":"Power Analysis Attacks: Revealing The Secrets of Smart Cards","author":"S Mangard","year":"2008","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing The Secrets of Smart Cards, vol. 31. Springer, Heidelberg (2008)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel (2002)","key":"8_CR23"},{"doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, New York, NY, USA, pp. 199\u2013212. ACM (2009)","key":"8_CR24","DOI":"10.1145\/1653662.1653687"},{"doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: Proceedings of the Fourth European Workshop on System Security, p. 1. ACM (2011)","key":"8_CR25","DOI":"10.1145\/1972551.1972552"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"unstructured":"VMWare. Understanding Memory Resource Management in VMware vSphere 5.0. http:\/\/www.vmware.com\/files\/pdf\/mem_mgmt_perf_vsphere5.pdf","key":"8_CR27"},{"issue":"SI","key":"8_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/844128.844146","volume":"36","author":"CA Waldspurger","year":"2002","unstructured":"Waldspurger, C.A.: Memory resource management in VMware ESX server. ACM SIGOPS Operating Syst. Rev. 36(SI), 181\u2013194 (2002)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, pp. 719\u2013732. USENIX Association, August 2014","key":"8_CR29"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Oprea, A., Reiter, M.K.: HomeAlone: co-residency detection in the cloud via side-channel analysis. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 2011, Washington, DC, USA, pp. 313\u2013328. IEEE Computer Society (2011)","key":"8_CR30","DOI":"10.1109\/SP.2011.31"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, New York, NY, USA, pp. 305\u2013316. ACM (2012)","key":"8_CR31","DOI":"10.1145\/2382196.2382230"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21476-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T08:56:57Z","timestamp":1748509017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21476-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319214757","9783319214764"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21476-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}