{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:43:36Z","timestamp":1772045016834,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Comput. Arch. Lett."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1109\/lca.2020.2964212","type":"journal-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T18:42:24Z","timestamp":1578422544000},"page":"9-12","source":"Crossref","is-referenced-by-count":26,"title":["Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2098-2606","authenticated-orcid":false,"given":"Rahul","family":"Bodduna","sequence":"first","affiliation":[]},{"given":"Vinod","family":"Ganesan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-2219","authenticated-orcid":false,"given":"Patanjali","family":"SLPSK","sequence":"additional","affiliation":[]},{"given":"Kamakoti","family":"Veezhinathan","sequence":"additional","affiliation":[]},{"given":"Chester","family":"Rebeiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"ref13","article-title":"Cache missing for fun and profit (2005)","author":"percival","year":"2015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322246"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref17","first-page":"639","article-title":"Robust website fingerprinting through the cache occupancy channel","author":"shusterman","year":"2019","journal-title":"Proc 28th USENIX Security Symp"},{"key":"ref18","first-page":"427","article-title":"Dynamically finding minimal eviction sets can be quicker than you think for side-channel attacks against the LLC","author":"song","year":"2019","journal-title":"Proc Int Symp Res Attacks Intrusions Defenses"},{"key":"ref19","first-page":"39","article-title":"Theory and practice of finding eviction sets","author":"vila","year":"2018","journal-title":"Proc IEEE Symp Privacy Secur"},{"key":"ref4","first-page":"208","article-title":"PRINCE &#x2013; a low-latency block cipher for pervasive computing applications","author":"borghoff","year":"2012","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063454"},{"key":"ref8","author":"katz","year":"0","journal-title":"Handbook of Applied Cryptography"},{"key":"ref7","first-page":"46","article-title":"Data encryption standard","year":"1999","journal-title":"Fed Inf Process Stand Publ"},{"key":"ref2","first-page":"39","article-title":"Camellia: A 128-bit block cipher suitable for multiple platforms design andanalysis","author":"aoki","year":"2000","journal-title":"Proc Workshop Sel Areas Cryptography"},{"key":"ref1","article-title":"TPC-C","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_20"}],"container-title":["IEEE Computer Architecture Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10208\/8968801\/08950094.pdf?arnumber=8950094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:01:08Z","timestamp":1651078868000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8950094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/lca.2020.2964212","relation":{},"ISSN":["1556-6056","1556-6064","2473-2575"],"issn-type":[{"value":"1556-6056","type":"print"},{"value":"1556-6064","type":"electronic"},{"value":"2473-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}