{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:57:14Z","timestamp":1760623034692},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/micro.2016.7783742","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T17:11:05Z","timestamp":1482167465000},"page":"1-14","source":"Crossref","is-referenced-by-count":31,"title":["ReplayConfusion: Detecting cache-based covert channel attacks using record and replay"],"prefix":"10.1109","author":[{"given":"Mengjia","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yasser","family":"Shalabi","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Automatic autocorrelation and spectral analysis","year":"2006","author":"broersen","key":"ref39"},{"key":"ref38","article-title":"Detecting covert timing channels with time-deterministic replay","author":"chen","year":"2014","journal-title":"OSDI"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2892242.2892257"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.02.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346321"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095820"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056069"},{"key":"ref12","article-title":"STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud","author":"kim","year":"2012","journal-title":"Usenix Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1992-13-404"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898086"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.42"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508254"},{"key":"ref4","article-title":"Keyboards and covert channels","author":"shah","year":"2006","journal-title":"Usenix Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485977"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"article-title":"Cache missing for fun and profit","year":"2005","author":"percival","key":"ref6"},{"article-title":"Xen deterministic time-travel (XenTT)","year":"0","author":"burtsev","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref8","article-title":"Whispers in the hyper-space: high-speed covert channel attacks in the cloud","author":"wu","year":"2012","journal-title":"Usenix Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/2046660.2046670","article-title":"An exploration of L2 cache covert channels in virtualized environ-ments","author":"xu","year":"2011","journal-title":"CCSW"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655019"},{"key":"ref20","article-title":"Advances on access-driven cache attacks on AES","author":"neve","year":"2006","journal-title":"Sac"},{"key":"ref45","article-title":"Memory bandwidth and machine balance in current high performance computers","author":"mccalpin","year":"1995","journal-title":"TCCAD"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_3"},{"key":"ref21","article-title":"Cache attacks and counter-measures: the case of AES","author":"osvik","year":"2006","journal-title":"CT-RSA"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024954"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.56"},{"key":"ref41","article-title":"DeLorean: Recording and deterministically replaying shared-memory multiprocessor execution efficiently","author":"montesinos","year":"2008","journal-title":"ISCA"},{"key":"ref23","article-title":"Mapping the Intel last-level cache","author":"yarom","year":"2015","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref44","article-title":"SPEC CPU2006 benchmark descriptions","author":"henning","year":"0","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref26","article-title":"HexPADS: a platform to detect stealth attacks","author":"payer","year":"2016","journal-title":"ESSoS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14778\/2732240.2732246"},{"key":"ref25","article-title":"Real time detection of cache-based side-channel attacks using hardware performance counters","author":"chiappetta","year":"2015","journal-title":"Cryptology ePrint Archive Report"}],"event":{"name":"2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","start":{"date-parts":[[2016,10,15]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7777315\/7783693\/07783742.pdf?arnumber=7783742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T14:51:40Z","timestamp":1568645500000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7783742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/micro.2016.7783742","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}