{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:41:53Z","timestamp":1773841313703,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s41635-017-0025-y","type":"journal-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T12:12:56Z","timestamp":1511784776000},"page":"33-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":128,"title":["A Survey of Side-Channel Attacks on Caches and Countermeasures"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8322-156X","authenticated-orcid":false,"given":"Yangdi","family":"Lyu","sequence":"first","affiliation":[]},{"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Ac\u0131i\u00e7mez O (2007) Yet another microarchitectural attack:: exploiting i-cache. In: Proceedings of the 2007 ACM workshop on computer security architecture. ACM, New York CSAW \u201907, pp 11\u201318. \n                        https:\/\/doi.org\/10.1145\/1314466.1314469","DOI":"10.1145\/1314466.1314469"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-0-387-71817-0_18","volume-title":"Microarchitectural attacks and countermeasures","author":"O Ac\u0131i\u00e7mez","year":"2009","unstructured":"Ac\u0131i\u00e7mez O, Ko\u00e7 \u00c7K (2009) Microarchitectural attacks and countermeasures. Springer, Boston, pp 475\u2013504. \n                        https:\/\/doi.org\/10.1007\/978-0-387-71817-0_18"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Ac\u0131i\u00e7mez O, Schindler W, Ko\u00e7 \u00c7K (2005) Improving Brumley and Boneh timing attack on unprotected SSL implementations. In: Proceedings of the 12th ACM conference on computer and communications security, ACM, New York, CCS \u201905, pp 139\u2013146. \n                        https:\/\/doi.org\/10.1145\/1102120.1102140","DOI":"10.1145\/1102120.1102140"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Cache based remote timing attack on the AES","author":"O Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez O, Schindler W, Ko\u00e7 \u00c7K (2006) Cache based remote timing attack on the AES. Springer, Berlin, pp 271\u2013286. \n                        https:\/\/doi.org\/10.1007\/11967668_18"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Ac\u0131i\u00e7mez O, Ko\u00e7 \u00c7K, Seifert JP (2007) On the power of simple branch prediction analysis. In: Proceedings of the 2Nd ACM symposium on information, computer and communications security, ACM, New York, ASIACCS \u201907, pp 312\u2013320. \n                        https:\/\/doi.org\/10.1145\/1229285.1266999","DOI":"10.1145\/1229285.1266999"},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Bates A, Mood B, Pletcher J, Pruse H, Valafar M, Butler K (2012) Detecting co-residency with active traffic analysis techniques. In: Proceedings of the 2012 ACM workshop on cloud computing security workshop, ACM, New York, CCSW \u201912, pp 1\u201312. \n                        https:\/\/doi.org\/10.1145\/2381913.2381915","DOI":"10.1145\/2381913.2381915"},{"key":"25_CR7","unstructured":"Bernstein DJ (2005) Cache-timing attacks on AES. Preprint available at \n                        http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-33481-8_9","volume-title":"The security impact of a new cryptographic library","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein DJ, Lange T, Schwabe P (2012) The security impact of a new cryptographic library. Springer , Berlin, pp 159\u2013176. \n                        https:\/\/doi.org\/10.1007\/978-3-642-33481-8_9"},{"key":"25_CR9","unstructured":"Bhatkar S, DuVarney D C, Sekar R (2003) Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: USENIX security symposium"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"A fast new DES implementation in software","author":"E Biham","year":"1997","unstructured":"Biham E (1997) A fast new DES implementation in software. Springer, Berlin, pp 260\u2013272. \n                        https:\/\/doi.org\/10.1007\/BFb0052352"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-11925-5_17","volume-title":"Differential cache-collision timing attacks on AES with applications to embedded CPUs","author":"A Bogdanov","year":"2010","unstructured":"Bogdanov A, Eisenbarth T, Paar C, Wienecke M (2010) Differential cache-collision timing attacks on AES with applications to embedded CPUs. Springer, Berlin, pp 235\u2013251. \n                        https:\/\/doi.org\/10.1007\/978-3-642-11925-5_17"},{"key":"25_CR12","unstructured":"Brickell E (2011) Technologies to improve platform security. CHES\u201911 Invited Talk, Sep 2011, \n                        https:\/\/www.iacr.org\/workshops\/ches\/ches2011\/presentations\/Invited%201\/CHES2011_Invited_1.pdf"},{"key":"25_CR13","unstructured":"Brickell E, Graunke G, Neve M, Seifert J (2006) Software mitigations to hedge AES, against cache-based software side channel vulnerabilities. IACR Cryptology ePrint Archive 2006:52"},{"key":"25_CR14","unstructured":"Brumley D, Boneh D (2003) Remote timing attacks are practical. In: Proceedings of the 12th conference on USENIX security symposium, vol 12. USENIX Association, Berkeley SSYM\u201903, pp 1\u20131"},{"key":"25_CR15","unstructured":"Chiappetta M, Savas E, Yilmaz C (2015) Real time detection of cache-based side-channel attacks using hardware performance counters. IACR Cryptology ePrint Archive 2015:1034"},{"issue":"4","key":"25_CR16","doi-asserted-by":"publisher","first-page":"23:1","DOI":"10.1145\/2086696.2086702 https:\/\/doi.org\/10.1145\/2086696.2086702","volume":"8","author":"JV Cleemput","year":"2012","unstructured":"Cleemput J V, Coppens B, De Sutter B (2012) Compiler mitigations for time attacks on modern x86 processors. ACM Trans Archit Code Optim 8(4):23:1\u201323:20. \n                        https:\/\/doi.org\/10.1145\/2086696.2086702","journal-title":"ACM Trans Archit Code Optim"},{"key":"25_CR17","doi-asserted-by":"publisher","unstructured":"Cock D, Ge Q, Murray T, Heiser G (2014) The last mile: an empirical study of timing channels on sel4. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, ACM, New York, CCS \u201914, pp 570\u2013581 . \n                        https:\/\/doi.org\/10.1145\/2660267.2660294","DOI":"10.1145\/2660267.2660294"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Coppens B, Verbauwhede I, Bosschere KD, Sutter BD (2009) Practical mitigations for timing-based side-channel attacks on modern x86 processors. In: 2009 30th IEEE symposium on security and privacy. \n                        https:\/\/doi.org\/10.1109\/SP.2009.19\n                        \n                    , pp 45\u201360","DOI":"10.1109\/SP.2009.19"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Crane S, Homescu A, Brunthaler S, Larsen P, Franz M (2015) Thwarting cache side-channel attacks through dynamic software diversity. In: 22Nd annual network and distributed system security symposium, NDSS 2015, San diego","DOI":"10.14722\/ndss.2015.23264"},{"key":"25_CR20","unstructured":"Daemen J, Rijmen V (1999) AES proposal: Rijndael. version 2, AES submission document, \n                        http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/Rijndael-ammended.pdf"},{"key":"25_CR21","unstructured":"Erlingsson \u00da, Abadi M (2007) Operating system protection against side-channel attacks that exploit memory latency. Tech. rep., \n                        https:\/\/www.microsoft.com\/en-us\/research\/publication\/operating-system-protection-against-side-channel-attacks-that-exploit-memory-latency\/"},{"key":"25_CR22","unstructured":"Ge Q, Yarom Y, Cock D, Heiser G (2016) A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. IACR, Cryptology ePrint Archive 2016:613"},{"issue":"4","key":"25_CR23","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TCC.2014.2358236","volume":"2","author":"M Godfrey","year":"2014","unstructured":"Godfrey M, Zulkernine M (2014) Preventing cache-based side-channel attacks in a cloud environment. IEEE Transactions on Cloud Computing 2(4):395\u2013408. \n                        https:\/\/doi.org\/10.1109\/TCC.2014.2358236","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"25_CR24","unstructured":"Gruss D, Spreitzer R, Mangard S (2015) Cache template attacks: automating attacks on inclusive last-level caches. In: 24Th USENIX security symposium (USENIX security 15). USENIX Association, Washington, D.C., pp 897\u2013912"},{"key":"25_CR25","doi-asserted-by":"publisher","unstructured":"Gruss D, Maurice C, Wagner K, Mangard S (2016) Flush + flush: a fast and stealthy cache attack. In: Proceedings of the 13th international conference on detection of intrusions and malware, and vulnerability assessment, vol 9721, Springer, New York, Inc., DIMVA 2016, pp 279\u2013299. \n                        https:\/\/doi.org\/10.1007\/978-3-319-40667-1_14","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Gullasch D, Bangerter E, Krenn S (2011) Cache games\u2014bringing access-based cache attacks on AES to practice. In: Proceedings of the 2011 IEEE symposium on security and privacy, IEEE Computer Society, Washington, SP \u201911, pp 490\u2013505. \n                        https:\/\/doi.org\/10.1109\/SP.2011.22","DOI":"10.1109\/SP.2011.22"},{"key":"25_CR27","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-21476-4_8","volume-title":"A faster and more realistic flush + reload attack on AES","author":"B G\u00fclmezo\u011flu","year":"2015","unstructured":"G\u00fclmezo\u011flu B, \u0130nci MS, Irazoqui G, Eisenbarth T, Sunar B (2015) A faster and more realistic flush + reload attack on AES. Springer International Publishing, Cham, pp 111\u2013126. \n                        https:\/\/doi.org\/10.1007\/978-3-319-21476-4_8"},{"key":"25_CR28","first-page":"18","volume-title":"Accelerating AES with vector permute instructions","author":"M Hamburg","year":"2009","unstructured":"Hamburg M (2009) Accelerating AES with vector permute instructions. Springer, Berlin, pp 18\u201332"},{"key":"25_CR29","doi-asserted-by":"publisher","unstructured":"Hund R, Willems C, Holz T (2013) Practical timing side channel attacks against kernel space ASLR. In: 2013 IEEE symposium on security and privacy. \n                        https:\/\/doi.org\/10.1109\/SP.2013.23\n                        \n                    , pp 191\u2013205","DOI":"10.1109\/SP.2013.23"},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-43283-0_2","volume-title":"Co-location detection on the cloud","author":"MS \u0130nci","year":"2016","unstructured":"\u0130nci MS, G\u00fclmezo\u011flu B, Eisenbarth T, Sunar B (2016) Co-location detection on the cloud. Springer International Publishing, Cham, pp 19\u201334. \n                        https:\/\/doi.org\/10.1007\/978-3-319-43283-0_2"},{"key":"25_CR31","doi-asserted-by":"publisher","unstructured":"\u0130nci MS, G\u00fclmezo\u011flu B, Irazoqui G, Eisenbarth T, Sunar B (2016) Cache attacks enable bulk key recovery on the cloud. In: Cryptographic hardware and embedded systems - CHES 2016 - 18th international conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, . \n                        https:\/\/doi.org\/10.1007\/978-3-662-53140-2_18\n                        \n                    , pp 368\u2013388","DOI":"10.1007\/978-3-662-53140-2_18"},{"key":"25_CR32","doi-asserted-by":"publisher","unstructured":"Irazoqui G, Inci MS, Eisenbarth T, Sunar B (2014) Fine grain cross-vm attacks on xen and vmware. In: Proceedings of the 2014 IEEE fourth international conference on big data and cloud computing, IEEE Computer Society, Washington, BDCLOUD \u201914, pp 737\u2013744. \n                        https:\/\/doi.org\/10.1109\/BDCloud.2014.102","DOI":"10.1109\/BDCloud.2014.102"},{"key":"25_CR33","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-11379-1_15","volume-title":"Wait a minute! A fast, cross-VM attack on AES","author":"G Irazoqui","year":"2014","unstructured":"Irazoqui G, Inci MS, Eisenbarth T, Sunar B (2014) Wait a minute! A fast, cross-VM attack on AES. Springer International Publishing, Cham, pp 299\u2013319. \n                        https:\/\/doi.org\/10.1007\/978-3-319-11379-1_15"},{"key":"25_CR34","doi-asserted-by":"publisher","unstructured":"Irazoqui G, Eisenbarth T, Sunar B (2015) S$A: a shared cache attack that works across cores and defies VM sandboxing\u2014and its application to AES. In: 2015 IEEE symposium on security and privacy. \n                        https:\/\/doi.org\/10.1109\/SP.2015.42\n                        \n                    , pp 591\u2013604","DOI":"10.1109\/SP.2015.42"},{"key":"25_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04138-9_1","volume-title":"Faster and timing-attack resistant AES-GCM","author":"E K\u00e4sper","year":"2009","unstructured":"K\u00e4sper E, Schwabe P (2009) Faster and timing-attack resistant AES-GCM. Springer , Berlin, pp 1\u201317. \n                        https:\/\/doi.org\/10.1007\/978-3-642-04138-9_1"},{"issue":"2,3","key":"25_CR36","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J Kelsey","year":"2000","unstructured":"Kelsey J, Schneier B, Wagner D, Hall C (2000) Side channel cryptanalysis of product ciphers. J Comput Secur 8(2,3):141\u2013158","journal-title":"J Comput Secur"},{"key":"25_CR37","unstructured":"kernelorg (2009) Address space layout randomization (ASLR). \n                        https:\/\/www.kernel.org\/doc\/Documentation\/vm\/ksm.txt"},{"key":"25_CR38","unstructured":"Kim T, Peinado M, Mainar-Ruiz G (2012) Stealthmem: system-level protection against cache-based side channel attacks in the cloud. In: Presented as part of the 21st USENIX security symposium (USENIX security 12). Bellevue, USENIX, pp 189\u2013204"},{"key":"25_CR39","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"PC Kocher","year":"1996","unstructured":"Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Springer , Berlin, pp 104\u2013113. \n                        https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"25_CR40","doi-asserted-by":"publisher","unstructured":"Kong J, Aciicmez O, Seifert JP, Zhou H (2009) Hardware-software integrated approaches to defend against software cache-based side channel attacks. In: 2009 IEEE 15th international symposium on high performance computer architecture. \n                        https:\/\/doi.org\/10.1109\/HPCA.2009.4798277\n                        \n                    , pp 393\u2013404","DOI":"10.1109\/HPCA.2009.4798277"},{"key":"25_CR41","volume-title":"Cache attacks on arm","author":"M Lipp","year":"2016","unstructured":"Lipp M (2016) Cache attacks on arm. Master thesis, Graz, University Of Technology"},{"key":"25_CR42","unstructured":"Lipp M, Gruss D, Spreitzer R, Maurice C, Mangard S (2016) Armageddon: cache attacks on mobile devices. In: 25Th USENIX security symposium (USENIX security 16). USENIX association, Austin, pp 549\u2013564"},{"key":"25_CR43","doi-asserted-by":"publisher","unstructured":"Liu F, Yarom Y, Ge Q, Heiser G, Lee RB (2015) Last-level cache side-channel attacks are practical. In: 2015 IEEE symposium on security and privacy. \n                        https:\/\/doi.org\/10.1109\/SP.2015.43\n                        \n                    , pp 605\u2013622","DOI":"10.1109\/SP.2015.43"},{"issue":"3","key":"25_CR44","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1145\/2366231.2337173","volume":"40","author":"R Martin","year":"2012","unstructured":"Martin R, Demme J, Sethumadhavan S (2012) Timewarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. SIGARCH Comput Archit News 40(3):118\u2013129. \n                        https:\/\/doi.org\/10.1145\/2366231.2337173","journal-title":"SIGARCH Comput Archit News"},{"key":"25_CR45","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-540-74735-2_9","volume-title":"On the power of bitslice implementation on Intel core2 processor","author":"M Matsui","year":"2007","unstructured":"Matsui M, Nakajima J (2007) On the power of bitslice implementation on Intel core2 processor. Springer, Berlin, pp 121\u2013134. \n                        https:\/\/doi.org\/10.1007\/978-3-540-74735-2_9"},{"key":"25_CR46","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery PL (1985) Modular multiplication without trial division. Math Comput 44:519\u2013521","journal-title":"Math Comput"},{"key":"25_CR47","doi-asserted-by":"publisher","unstructured":"Oren Y, Kemerlis VP, Sethumadhavan S, Keromytis AD (2015) The spy in the sandbox: practical cache attacks in javascript and their implications. In: Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, ACM, New York, CCS \u201915, pp 1406\u20131418 . \n                        https:\/\/doi.org\/10.1145\/2810103.2813708","DOI":"10.1145\/2810103.2813708"},{"key":"25_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Cache attacks and countermeasures: the case of AES","author":"DA Osvik","year":"2006","unstructured":"Osvik DA, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of AES. Springer , Berlin, pp 1\u201320. \n                        https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"25_CR49","doi-asserted-by":"publisher","unstructured":"Owens R, Wang W (2011) Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines. In: 30th IEEE international performance computing and communications conference. \n                        https:\/\/doi.org\/10.1109\/PCCC.2011.6108094\n                        \n                    , pp 1\u20138","DOI":"10.1109\/PCCC.2011.6108094"},{"key":"25_CR50","unstructured":"Page D (2002) Theoretical use of cache memory as a cryptanalytic side-channel. Cryptology ePrint Archive, Report 2002\/169, \n                        http:\/\/eprint.iacr.org\/2002\/169"},{"key":"25_CR51","unstructured":"Page D (2005) Partitioned cache architecture as a side-channel defence mechanism. Cryptology ePrint Archive, Report 2005\/280, \n                        http:\/\/eprint.iacr.org\/2005\/280"},{"key":"25_CR52","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-30806-7_9","volume-title":"HexPADS: a platform to detect \u201cStealth\u201d attacks","author":"M Payer","year":"2016","unstructured":"Payer M (2016) HexPADS: a platform to detect \u201cStealth\u201d attacks. Springer International Publishing, Cham, pp 138\u2013154. \n                        https:\/\/doi.org\/10.1007\/978-3-319-30806-7_9"},{"key":"25_CR53","unstructured":"Percival C (2005) Cache missing for fun and profit. BSDCan 2005"},{"key":"25_CR54","doi-asserted-by":"publisher","unstructured":"Raj H, Nathuji R, Singh A, England P (2009) Resource management for isolation enhanced cloud services. In: Proceedings of the 2009 ACM workshop on cloud computing security, ACM, New York, CCSW \u201909, pp 77\u201384. \n                        https:\/\/doi.org\/10.1145\/1655008.1655019","DOI":"10.1145\/1655008.1655019"},{"key":"25_CR55","doi-asserted-by":"publisher","unstructured":"Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, ACM, New York, CCS \u201909, pp 199\u2013212. \n                        https:\/\/doi.org\/10.1145\/1653662.1653687","DOI":"10.1145\/1653662.1653687"},{"key":"25_CR56","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-662-43826-8_3","volume-title":"Towards more practical time-driven cache attacks","author":"R Spreitzer","year":"2014","unstructured":"Spreitzer R, G\u00e9rard B (2014) Towards more practical time-driven cache attacks. Springer , Berlin , pp 24\u201339. \n                        https:\/\/doi.org\/10.1007\/978-3-662-43826-8_3"},{"key":"25_CR57","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1007\/978-3-642-38631-2_53","volume-title":"On the applicability of time-driven cache attacks on mobile devices","author":"R Spreitzer","year":"2013","unstructured":"Spreitzer R, Plos T (2013) On the applicability of time-driven cache attacks on mobile devices. Springer , Berlin, pp 656\u2013662. \n                        https:\/\/doi.org\/10.1007\/978-3-642-38631-2_53"},{"key":"25_CR58","unstructured":"Team P (2003) Address space layout randomization (ASLR). \n                        http:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"issue":"1","key":"25_CR59","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"E Tromer","year":"2010","unstructured":"Tromer E, Osvik D A, Shamir A (2010) Efficient cache attacks on AES, and countermeasures. J Cryptol 23(1):37\u201371. \n                        https:\/\/doi.org\/10.1007\/s00145-009-9049-y","journal-title":"J Cryptol"},{"key":"25_CR60","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptanalysis of DES implemented on computers with cache","author":"Y Tsunoo","year":"2003","unstructured":"Tsunoo Y, Saito T, Suzaki T, Shigeri M, Miyauchi H (2003) Cryptanalysis of DES implemented on computers with cache. Springer, Berlin, pp 62\u201376. \n                        https:\/\/doi.org\/10.1007\/978-3-540-45238-6_6"},{"key":"25_CR61","unstructured":"Varadarajan V, Ristenpart T, Swift M (2014) Scheduler-based defenses against cross-vm side-channels. In: 23Rd USENIX security symposium (USENIX security 14). USENIX Association, San Diego, pp 687\u2013702"},{"key":"25_CR62","unstructured":"Varadarajan V, Zhang Y, Ristenpart T, Swift M (2015) A placement vulnerability study in multi-tenant public clouds. In: 24Th USENIX security symposium (USENIX security 15). USENIX Association, Washington, pp 913\u2013928"},{"key":"25_CR63","doi-asserted-by":"publisher","unstructured":"Vattikonda BC, Das S, Shacham H (2011) Eliminating fine grained timers in xen. In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, ACM, New York, CCSW \u201911, pp 41\u201346. \n                        https:\/\/doi.org\/10.1145\/2046660.2046671","DOI":"10.1145\/2046660.2046671"},{"issue":"2","key":"25_CR64","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/1273440.1250723","volume":"35","author":"Z Wang","year":"2007","unstructured":"Wang Z, Lee R B (2007) New cache designs for thwarting software cache-based side channel attacks. SIGARCH Comput Archit News 35(2):494\u2013505. \n                        https:\/\/doi.org\/10.1145\/1273440.1250723","journal-title":"SIGARCH Comput Archit News"},{"key":"25_CR65","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-32946-3_23","volume-title":"A cache timing attack on AES in virtualization environments","author":"M Wei\u00df","year":"2012","unstructured":"Wei\u00df M, Heinz B, Stumpf F (2012) A cache timing attack on AES in virtualization environments. Springer , Berlin , pp 314\u2013328. \n                        https:\/\/doi.org\/10.1007\/978-3-642-32946-3_23"},{"key":"25_CR66","unstructured":"Wu Z, Xu Z, Wang H (2012) Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In: Presented as part of the 21st USENIX security symposium (USENIX security 12). Bellevue, USENIX, pp 159\u2013173"},{"key":"25_CR67","doi-asserted-by":"publisher","unstructured":"Xu J, Kalbarczyk Z, Iyer RK (2003) Transparent runtime randomization for security. In: 22nd international symposium on reliable distributed systems, 2003. Proceedings. \n                        https:\/\/doi.org\/10.1109\/RELDIS.2003.1238076\n                        \n                    , pp 260\u2013269","DOI":"10.1109\/RELDIS.2003.1238076"},{"key":"25_CR68","unstructured":"Xu Z, Wang H, Wu Z (2015) A measurement study on co-residence threat inside the cloud. In: 24Th USENIX security symposium (USENIX security 15). USENIX Association, Washington, pp 929\u2013944"},{"key":"25_CR69","unstructured":"Yarom Y, Benger N (2014) Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache side-channel attack. IACR Cryptology ePrint Archive 2014:140"},{"key":"25_CR70","unstructured":"Yarom Y, Falkner K (2014) FLUSH + RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: 23Rd USENIX security symposium (USENIX security 14). USENIX association, San Diego, pp 719\u2013732"},{"key":"25_CR71","doi-asserted-by":"publisher","unstructured":"Yarom Y, Genkin D, Heninger N (2017) Cachebleed: a timing attack on OpenSSL constant-time RSA. J Cryptogr Eng :1\u201314. \n                        https:\/\/doi.org\/10.1007\/s13389-017-0152-y","DOI":"10.1007\/s13389-017-0152-y"},{"key":"25_CR72","doi-asserted-by":"publisher","unstructured":"Zhang X, Xiao Y, Zhang Y (2016) Return-oriented flush-reload side channels on arm and their implications for android devices. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, New York, CCS \u201916. \n                        https:\/\/doi.org\/10.1145\/2976749.2978360\n                        \n                    , pp 858\u2013870","DOI":"10.1145\/2976749.2978360"},{"key":"25_CR73","doi-asserted-by":"crossref","unstructured":"Zhang Y, Reiter MK (2013) D\u00fcppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: 20th ACM SIGSAC conference on computer and communications security. ACM, New York, pp 827\u2013838","DOI":"10.1145\/2508859.2516741"},{"key":"25_CR74","doi-asserted-by":"publisher","unstructured":"Zhang Y, Juels A, Oprea A, Reiter MK (2011) Homealone: co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE symposium on security and privacy. \n                        https:\/\/doi.org\/10.1109\/SP.2011.31\n                        \n                    , pp 313\u2013328","DOI":"10.1109\/SP.2011.31"},{"key":"25_CR75","doi-asserted-by":"publisher","unstructured":"Zhang Y, Juels A, Reiter MK, Ristenpart T (2012) Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, New York, CCS \u201912, pp 305\u2013316. \n                        https:\/\/doi.org\/10.1145\/2382196.2382230","DOI":"10.1145\/2382196.2382230"},{"key":"25_CR76","doi-asserted-by":"publisher","unstructured":"Zhang Y, Juels A, Reiter MK, Ristenpart T (2014) Cross-tenant side-channel attacks in PaaS clouds. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, New York, CCS \u201914, pp 990\u20131003 . \n                        https:\/\/doi.org\/10.1145\/2660267.2660356","DOI":"10.1145\/2660267.2660356"},{"key":"25_CR77","doi-asserted-by":"publisher","unstructured":"Zhou Z, Reiter MK, Zhang Y (2016) A software approach to defeating side channels in last-level caches. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, New York, CCS \u201916, pp 871\u2013882, . \n                        https:\/\/doi.org\/10.1145\/2976749.2978324","DOI":"10.1145\/2976749.2978324"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0025-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0025-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0025-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T15:25:44Z","timestamp":1522077944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0025-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"references-count":77,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0025-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,27]]}}}