{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:48:33Z","timestamp":1761324513277,"version":"3.28.0"},"reference-count":84,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/hpca56546.2023.10070947","type":"proceedings-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T17:42:55Z","timestamp":1679679775000},"page":"317-332","source":"Crossref","is-referenced-by-count":2,"title":["AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks"],"prefix":"10.1109","author":[{"given":"Mulong","family":"Luo","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Wenjie","family":"Xiong","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Geunbae","family":"Lee","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Yueying","family":"Li","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Xiaomeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Amy","family":"Zhang","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Yuandong","family":"Tian","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Hsien-Hsin S.","family":"Lee","sequence":"additional","affiliation":[{"name":"Intel Corporation"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844475"},{"key":"ref4","article-title":"Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks","author":"Alam","year":"2017","journal-title":"Cryptology ePrint Archive"},{"article-title":"Dota 2 with large scale deep reinforcement learning","year":"2019","author":"Berner","key":"ref5"},{"article-title":"Cache-timing attacks on AES","year":"2005","author":"Bernstein","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"ref8","first-page":"1967","article-title":"RELOAD+ REFRESH: Abusing cache replacement policies to perform stealthy cache attacks","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Briongos"},{"journal-title":"OpenAI Gym","year":"2016","author":"Brockman","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.42"},{"article-title":"Leaking control flow information via the hardware prefetcher","year":"2021","author":"Chen","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.09.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378510"},{"key":"ref16","first-page":"451","article-title":"HybCache: Hybrid side-channel-resilient caches for trusted execution environments","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Dessouky"},{"key":"ref17","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)","author":"Devlin"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3152666"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00073"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358273"},{"key":"ref23","first-page":"341","article-title":"How secure is your cache against side-channel attacks?","volume-title":"Proceedings of the 50th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"He"},{"article-title":"Distributed prioritized experience replay","volume-title":"International Conference on Learning Representations","author":"Horgan","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480087"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1816038.1815971"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/325096.325162"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"ref29","article-title":"A survey of generalisation in deep reinforcement learning","author":"Kirk","year":"2021","journal-title":"CoRR"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0411-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484733"},{"volume-title":"Machine learning techniques for the computer security domain of anomaly detection.","year":"2000","author":"Lane","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27645-3_5"},{"key":"ref35","first-page":"549","article-title":"AR-Mageddon: Cache attacks on mobile devices","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lipp"},{"key":"ref36","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref38","first-page":"859","article-title":"Stealthy tracking of autonomous vehicles with cache side channels","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Luo"},{"key":"ref39","first-page":"785","article-title":"PowerSpy: Location tracking using mobile device power analysis","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Michalevsky"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00093"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref42","first-page":"1427","article-title":"Medusa: Microarchi-tectural data leakage via automated attack synthesis","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Moghimi"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/757"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00037"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507729"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3394885.3431595"},{"key":"ref49","first-page":"1","article-title":"Test generation using reinforcement learning for delay-based side-channel analysis","volume-title":"2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","author":"Pan"},{"key":"ref50","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Advances in Neural Information Processing Systems 32","author":"Paszke","year":"2019"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2011.5985898"},{"key":"ref52","first-page":"7652","article-title":"Sample factory: Egocentric 3D control from pixels at 100000 FPS with asynchronous reinforcement learning","volume-title":"Proceedings of the 37th International Conference on Machine Learning","volume":"119","author":"Petrenko"},{"key":"ref53","first-page":"360","article-title":"New attacks and defense for encrypted-address cache","volume-title":"2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)","author":"Qureshi"},{"key":"ref54","first-page":"5402","article-title":"Automatic Data Augmentation for Generalization in Reinforcement Learning","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Raileanu","year":"2021"},{"article-title":"SCARL: side-channel analysis with reinforcement learning on the ascon authenticated cipher","year":"2020","author":"Ramezanpour","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100266"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95085-9_9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446742"},{"key":"ref59","first-page":"1379","article-title":"MIRAGE: Mitigating conflict-based cache attacks with a practical fully-associative design","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Saileshwar"},{"article-title":"Proximal policy optimization algorithms","year":"2017","author":"Schulman","key":"ref60"},{"key":"ref61","first-page":"639","article-title":"Robust website fingerprinting through the cache occupancy channel","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Shusterman"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.18893.74727"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1038\/nature24270"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/356887.356892"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/12.2208"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24086"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00081"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386008"},{"key":"ref71","first-page":"1","article-title":"PAPP: Prefetcher-aware prime and probe side-channel attack","volume-title":"Proceedings of the 56th Annual Design Automation Conference 2019","author":"Wang"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"ref73","first-page":"1415","article-title":"Osiris: Automated discovery of microarchitectural side channels","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Weber"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23105"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3059531"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00021"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080222"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783742"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"article-title":"RLMeta: A Flexible Framework for Distributed Reinforcement Learning","year":"2022","author":"Yang","key":"ref81"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00024"},{"key":"ref83","first-page":"719","article-title":"FLUSH+ RELOAD: A high resolution, low noise, l3 cache side-channel attack","volume-title":"23rd USENIX security symposium (USENIX security 14)","author":"Yarom"},{"article-title":"Automated side channel analysis of media software with manifold learning","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yuan","key":"ref84"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694372"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"}],"event":{"name":"2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","start":{"date-parts":[[2023,2,25]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2023,3,1]]}},"container-title":["2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10070856\/10070923\/10070947.pdf?arnumber=10070947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:31:28Z","timestamp":1707831088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10070947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/hpca56546.2023.10070947","relation":{},"subject":[],"published":{"date-parts":[[2023,2]]}}}