{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:57:44Z","timestamp":1763704664077,"version":"3.45.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11241011","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["CacheGuardian: A Timing Side-Channel Resilient LLC Design"],"prefix":"10.1109","author":[{"given":"Ziang","family":"Zhou","sequence":"first","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Zhu","sequence":"additional","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hao","family":"Lan","sequence":"additional","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huifeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Yan","sequence":"additional","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[{"name":"Centrum Wiskunde &amp; Informatica,Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuejun","family":"An","sequence":"additional","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaochun","family":"Ye","sequence":"additional","affiliation":[{"name":"CAS,SKLP, Institute of Computing Technology,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","first-page":"719","article-title":"FLUSH+RELOAD: A high resolution, low noise, l3 cache Side-Channel attack","volume-title":"23rd USENIX security Symposium (USENIX security 14)","author":"Yarom"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640403"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"ref7","first-page":"897","article-title":"Cache template attacks: Automating attacks on inclusive {Last-Level} caches","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Gruss"},{"key":"ref8","first-page":"360","article-title":"New attacks and defense for encrypted-address cache","volume-title":"Proceedings of the 46th International Symposium on Computer Architecture","author":"Qureshi"},{"key":"ref9","first-page":"51","article-title":"Prime+ Abort: A Timer-Free High-Precision l3 cache attack using intel TSX","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Disselkoen"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304060"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"ref13","first-page":"451","article-title":"HybCache: Hybrid Side-Channel-Resilient caches for trusted execution environments","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Dessouky"},{"key":"ref14","article-title":"P refender: A prefetching defender against cache side channel attacks as a pretender","author":"Li","year":"2024","journal-title":"IEEE Transactions on Computers"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3063313"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218725"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"ref18","first-page":"675","article-title":"ScatterCache: thwarting cache attacks via cache set randomization","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Werner"},{"key":"ref19","first-page":"360","article-title":"New attacks and defense for encrypted-address cache","volume-title":"Proceedings of the 46th International Symposium on Computer Architecture","author":"Qureshi"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3349659"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354991"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00042"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3645109"},{"article-title":"Pcg: Mitigating conflict-based cache side-channel attacks with prefetching","year":"2024","author":"Jiang","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00052"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00037"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00085"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545972"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3637649"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485876"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00032"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","start":{"date-parts":[[2025,10,26]]},"location":"Munich, Germany","end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11241011.pdf?arnumber=11241011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:47:33Z","timestamp":1763704053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11241011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iccad66269.2025.11241011","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}