{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:28Z","timestamp":1772725588676,"version":"3.50.1"},"reference-count":79,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672062"],"award-info":[{"award-number":["61672062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,2]]},"DOI":"10.1109\/hpca57654.2024.00039","type":"proceedings-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T18:36:37Z","timestamp":1712082997000},"page":"424-438","source":"Crossref","is-referenced-by-count":11,"title":["SegScope: Probing Fine-grained Interrupts via Architectural Footprints"],"prefix":"10.1109","author":[{"given":"Xin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Software and Microelectronics, Peking University"}]},{"given":"Zhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Western Australia"}]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University"}]},{"given":"Wenhao","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,CAS"}]},{"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[{"name":"Data61, CSIRO"}]},{"given":"Zhuoxi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University"}]},{"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Semiconductors, (College of Integrated Circuits), Hunan University"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Amd64 architecture programmers manual volume 2: System programming","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655154"},{"key":"ref4","article-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient Out-of-Order execution","volume-title":"USENIX Security Symposium","author":"Bulck"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384747"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560688"},{"key":"ref8","volume-title":"BPF compiler collection (bcc)","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527416"},{"key":"ref10","article-title":"Intel sgx explained","author":"Costan","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484821"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567979"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00080"},{"key":"ref15","first-page":"3861","article-title":"Rapid prototyping for microarchitectural attacks","volume-title":"USENIX Security Symposium","author":"Easdon"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589050"},{"key":"ref17","article-title":"Introducing CIRCL: An advanced cryptographic library","author":"Faz-Hern\u00e1ndez","year":"2019","journal-title":"Cloudflare"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09484-2_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"ref22","volume-title":"Intel 64 and IA-32 architectures software developers manual combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176316"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616611"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3156596"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"ref30","first-page":"643","article-title":"AMD prefetch attacks through power and time","volume-title":"USENIX Security Symposium","author":"Lipp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"ref32","first-page":"549","article-title":"AR-Mageddon: Cache attacks on mobile devices","volume-title":"USENIX Security Symposium","author":"Lipp"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384746"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560682"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref37","volume-title":"Delving into transferable adversarial examples and black-box attacks","author":"Liu","year":"2017"},{"key":"ref38","first-page":"1397","article-title":"Dolma: Securing speculation with the principle of transient non-observability","volume-title":"USENIX Security Symposium","author":"Loughlin"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62974-8_11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3091159"},{"key":"ref41","article-title":"Can one hear the shape of a neural network?: Snooping the gpu via magnetic side channel","volume-title":"USENIX Security Symposium","author":"Maia"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2857038"},{"key":"ref44","first-page":"469","article-title":"CopyCat: Controlled Instruction-Level attacks on enclaves","volume-title":"USENIX Security Symposium","author":"Moghimi"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_10"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712588"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527429"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3472456.3472510"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23027"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_13"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"ref56","first-page":"639","article-title":"Robust website fingerprinting through the cache occupancy channel","volume-title":"USENIX Security Symposium","author":"Shusterman"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212504"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674829"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046671"},{"key":"ref63","volume-title":"\u03bc-second precision timer support for the linux kernel","author":"Walter","year":"2001"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179326"},{"key":"ref65","first-page":"679","article-title":"Hertzbleed: Turning power Side-Channel attacks into remote timing attacks on x86","volume-title":"USENIX Security Symposium","author":"Wang"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00031"},{"key":"ref67","first-page":"3183","article-title":"Rendering contention channel made practical in web browsers","volume-title":"USENIX Security Symposium","author":"Wu"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575700"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43904-9_3"},{"key":"ref70","first-page":"2003","article-title":"Cache telepathy: Leveraging shared resource attacks to learn DNN architectures","volume-title":"USENIX Security Symposium","author":"Yan"},{"key":"ref71","first-page":"719","article-title":"{FLUSH+ RELOAD}: A high resolution, low noise, 13 cache {Side-Channel} attack","volume-title":"USENIX Security Symposium","author":"Yarom"},{"key":"ref72","first-page":"1973","article-title":"Synchronization storage channels (S2C): Timer-less cache Side-Channel attacks on the apple m1 via hardware synchronization instructions","volume-title":"USENIX Security Symposium","author":"Yu"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612108"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095007"},{"key":"ref75","first-page":"17","article-title":"Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems","volume-title":"USENIX Security Symposium","author":"Zhang"},{"key":"ref76","article-title":"CacheWarp: Software-based fault injection using selective state reset","volume-title":"USENIX Security Symposium","author":"Zhang"},{"key":"ref77","article-title":"(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels","volume-title":"USENIX Security Symposium","author":"Zhang"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437517"},{"key":"ref79","article-title":"Hermes attack: Steal dnn models with lossless inference accuracy","volume-title":"USENIX Security Symposium","author":"Zhu"}],"event":{"name":"2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","location":"Edinburgh, United Kingdom","start":{"date-parts":[[2024,3,2]]},"end":{"date-parts":[[2024,3,6]]}},"container-title":["2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10476359\/10476395\/10476480.pdf?arnumber=10476480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T05:32:41Z","timestamp":1712122361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10476480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,2]]},"references-count":79,"URL":"https:\/\/doi.org\/10.1109\/hpca57654.2024.00039","relation":{},"subject":[],"published":{"date-parts":[[2024,3,2]]}}}