{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:43:24Z","timestamp":1743119004995,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819712373"},{"type":"electronic","value":"9789819712380"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1238-0_12","type":"book-chapter","created":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T18:30:58Z","timestamp":1709836258000},"page":"214-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Feasibility Analysis and\u00a0Performance Optimization of\u00a0the\u00a0Conflict Test Algorithms for\u00a0Searching Eviction Sets"],"prefix":"10.1007","author":[{"given":"Zhenzhen","family":"Li","sequence":"first","affiliation":[]},{"given":"Zihan","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Cache based remote timing attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 271\u2013286. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11967668_18"},{"key":"12_CR2","unstructured":"Alfs, G., Knupffer, N.: Intel fact sheet: Intel corporation\u2019s multicore architecture briefing (2008). https:\/\/www.intel.com\/pressroom\/archive\/releases\/2008\/20080317fact.htm"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MM.2020.2996616","volume":"40","author":"A Amid","year":"2020","unstructured":"Amid, A., et al.: Chipyard: integrated design, simulation, and implementation framework for custom SoCs. IEEE Micro 40(4), 10\u201321 (2020)","journal-title":"IEEE Micro"},{"key":"12_CR4","unstructured":"Asanovi\u0107, K., et al.: The Rocket chip generator. Technical report. UCB\/EECS-2016-17, University of California, Berkeley (2016)"},{"key":"12_CR5","unstructured":"Berg, C.: PLRU cache domino effects. In: Proceedings of the International Workshop on Worst-Case Execution Time Analysis (WCET) (2006)"},{"key":"12_CR6","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005). https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-93387-0_5","volume-title":"Applied Cryptography and Network Security","author":"D Genkin","year":"2018","unstructured":"Genkin, D., Pachmanov, L., Tromer, E., Yarom, Y.: Drive-by key-extraction cache attacks from portable code. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 83\u2013102. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93387-0_5"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-40667-1_15","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in JavaScript. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 300\u2013321. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_15"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"\u0130nci, M.S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., Sunar, B.: Cache attacks enable bulk key recovery on the cloud. In: Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES), pp. 368\u2013388. ICAR (2016)","DOI":"10.1007\/978-3-662-53140-2_18"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-11379-1_15","volume-title":"Research in Attacks, Intrusions and Defenses","author":"G Irazoqui","year":"2014","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! a fast, cross-VM attack on AES. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 299\u2013319. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11379-1_15"},{"key":"12_CR12","unstructured":"Jaleel, A., Borch, E., Bhandaru, M., Steely, S.C., Jr., Emer, J.: Achieving non-inclusive cache performance with inclusive caches: temporal locality aware (TLA) cache management policies. In: Proceedings of the Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE (2020)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Jaleel, A., Theobald, K.B., Steely, Jr., S.C., Emer, J.S.: High performance cache replacement using re-reference interval prediction (RRIP). In: Proceedings of the International Symposium on Computer Architecture (ISCA), pp. 60\u201371. ACM (2010)","DOI":"10.1145\/1816038.1815971"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P), pp. 19\u201337 (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"12_CR15","unstructured":"Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: Proceedings of the USENIX Security Symposium (Security), pp. 973\u2013990. USENIX Association (2018)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P). IEEE (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-319-26362-5_3","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"C Maurice","year":"2015","unstructured":"Maurice, C., Le Scouarnec, N., Neumann, C., Heen, O., Francillon, A.: Reverse engineering intel last-level cache complex addressing using performance counters. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 48\u201365. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_3"},{"key":"12_CR18","unstructured":"Percival, C.: Cache missing for fun and profit (2005)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Purnal, A., Giner, L., Gru\u00df, D., Verbauwhede, I.: Systematic analysis of randomization-based protected cache architectures. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P), pp. 987\u20131002. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00011"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Purnal, A., Turan, F., Verbauwhede, I.: Prime+Scope: overcoming the observer effect for high-precision cache contention attacks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2906\u20132920. ACM (2021)","DOI":"10.1145\/3460120.3484816"},{"key":"12_CR21","unstructured":"Purnal, A., Turan, F., Verbauwhede, I.: Double trouble: combined heterogeneous attacks on non-inclusive cache hierarchies. In: Proceedings of the USENIX Security Symposium (Security), pp. 3647\u20133664. USENIX Association (2022)"},{"key":"12_CR22","unstructured":"Purnal, A., Verbauwhede, I.: Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache. arXiv cs.CR (2019)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Qureshi, M.K.: New attacks and defense for encrypted-address cache. In: Proceedings of the International Symposium on Computer Architecture (ISCA), pp. 360\u2013371. ACM (2019)","DOI":"10.1145\/3307650.3322246"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 199\u2013212. ACM (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Savage, J.E., Zubair, M.: A unified model for multicore architectures. In: Proceedings of the International Forum on Next-Generation Multicore\/Manycore Technologies (IFMT), p. 12. ACM (2008)","DOI":"10.1145\/1463768.1463780"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-031-15255-9_3","volume-title":"Advances in Information and Computer Security","author":"S Shen","year":"2022","unstructured":"Shen, S., Li, Z., Song, W.: Methods of extracting parameters of the processor caches. In: Cheng, C.M., Akiyama, M. (eds.) IWSEC 2022. LNCS, vol. 13504, pp. 47\u201365. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15255-9_3"},{"key":"12_CR27","unstructured":"Song, W., Liu, P.: Dynamically finding minimal eviction sets can be quicker than you think for side-channel attacks against the LLC. In: Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 427\u2013442. USENIX Association (2019)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Thoma, J.P., G\u00fcneysu, T.: Write me and I\u2019ll tell you secrets \u2013 write-after-write effects on Intel CPUs. In: Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID). ACM (2022)","DOI":"10.1145\/3545948.3545987"},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"E Tromer","year":"2010","unstructured":"Tromer, E., Osvik, D.A., Shamir, A.: Efficient cache attacks on AES, and countermeasures. J. Cryptol. 23(1), 37\u201371 (2010)","journal-title":"J. Cryptol."},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"T\u00f3th, R., Faigl, Z., Szalay, M., Imre, S.: An advanced timing attack scheme on RSA. In: Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, vol. Supplement, pp. 1\u20139 (2008)","DOI":"10.1109\/NETWKS.2008.6231357"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Vila, P., Ganty, P., Guarnieri, M., K\u00f6pf, B.: CacheQuery: learning replacement policies from hardware caches. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). ACM (2020)","DOI":"10.1145\/3385412.3386008"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Vila, P., K\u00f6pf, B., Morales, J.F.: Theory and practice of finding eviction sets. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P), pp. 39\u201354. IEEE (2019)","DOI":"10.1109\/SP.2019.00042"},{"key":"12_CR33","unstructured":"Wong, H.: Intel Ivy Bridge cache replacement policy (2013). https:\/\/blog.stuffedcow.net\/2013\/01\/ivb-cache-replacement\/"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Yan, M., Gopireddy, B., Shull, T., Torrellas, J.: Secure hierarchy-aware cache replacement policy (SHARP): defending against cache-based side channel attacks. In: Proceedings of the Annual International Symposium on Computer Architecture (ISCA), pp. 347\u2013360. ACM (2017)","DOI":"10.1145\/3140659.3080222"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Yan, M., Sprabery, R., Gopireddy, B., Fletcher, C.W., Campbell, R.H., Torrellas, J.: Attack directories, not caches: side-channel attacks in a non-inclusive world. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P), pp. 888\u2013904. IEEE (2019)","DOI":"10.1109\/SP.2019.00004"},{"key":"12_CR36","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the USENIX Security Symposium (Security), pp. 719\u2013732. USENIX Association (2014)"},{"key":"12_CR37","unstructured":"Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing (2005). https:\/\/eprint.iacr.org\/2005\/388"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1238-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T18:32:25Z","timestamp":1709836345000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1238-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712373","9789819712380"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1238-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"8 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/static\/pastconferences","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}