{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:24:05Z","timestamp":1763724245357},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642150302"},{"type":"electronic","value":"9783642150319"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_8","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"110-124","source":"Crossref","is-referenced-by-count":54,"title":["New Results on Instruction Cache Attacks"],"prefix":"10.1007","author":[{"given":"Onur","family":"Ac\u0131i\u00e7mez","sequence":"first","affiliation":[]},{"given":"Billy Bob","family":"Brumley","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Grabher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"http:\/\/cvs.openssl.org\/chngview?cn=16275"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1314466.1314469","volume-title":"Proceedings of the 1st ACM Workshop on Computer Security Architecture (CSAW 2007)","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O.: Yet another microarchitectural attack: Exploiting I-cache. In: Proceedings of the 1st ACM Workshop on Computer Security Architecture (CSAW 2007), pp. 11\u201318. ACM Press, New York (2007)"},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS\u00a02007)","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.-P.: On the power of simple branch prediction analysis. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS\u00a02007), pp. 312\u2013320. ACM Press, New York (2007)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-540-79263-5_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"O. Ac\u0131i\u00e7mez","year":"2008","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W.: A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 256\u2013273. Springer, Heidelberg (2008)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Cache based remote timing attacks on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 271\u2013286. Springer, Heidelberg (2006)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-642-10366-7_39","volume-title":"ASIACRYPT 2009","author":"B.B. Brumley","year":"2009","unstructured":"Brumley, B.B., Hakala, R.M.: Cache-timing template attacks. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 667\u2013684. Springer, Heidelberg (2009)"},{"key":"8_CR7","unstructured":"Intel Corporation: Intel(R) 64 and IA-32 Architectures Software Developer\u2019s Manual, http:\/\/developer.intel.com\/Assets\/PDF\/manual\/253667.pdf"},{"key":"8_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., Vanstone, S., van Oorschot, P.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)"},{"issue":"177","key":"8_CR9","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048(177), 243\u2013264 (1987)","journal-title":"Mathematics of Computation"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Selected Areas in Cryptography","author":"M. Neve","year":"2007","unstructured":"Neve, M., Seifert, J.P.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol.\u00a04356, pp. 147\u2013162. Springer, Heidelberg (2007)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"8_CR12","unstructured":"Page, D.: Partitioned cache architecture as a side-channel defense mechanism. Cryptology ePrint Archive, Report 2005\/280 (2005), http:\/\/eprint.iacr.org"},{"key":"8_CR13","unstructured":"Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan 2005 (2005), http:\/\/www.daemonology.net\/papers\/htt.pdf"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1653662.1653687","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 199\u2013212. ACM Press, New York (2009)"},{"key":"8_CR15","unstructured":"Tsafrir, D., Etsion, Y., Feitelson, D.G.: Secretly monopolizing the CPU without superuser privileges. In: Proceedings of the 16th USENIX Security Symposium (SECURITY 2007), pp. 239\u2013256. USENIX Association (2007)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/1250662.1250723","volume-title":"Proceedings of the 34th Annual International Symposium on Computer Architecture (ISCA 2007)","author":"Z. Wang","year":"2007","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side-channel attacks. In: Proceedings of the 34th Annual International Symposium on Computer Architecture (ISCA 2007), pp. 494\u2013505. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T17:45:10Z","timestamp":1685727910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}