{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:40:14Z","timestamp":1759236014317,"version":"3.44.0"},"reference-count":11,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1942888","1954521","1956007"],"award-info":[{"award-number":["1942888","1954521","1956007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/mm.2025.3574715","type":"journal-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T13:46:33Z","timestamp":1748612793000},"page":"95-102","source":"Crossref","is-referenced-by-count":0,"title":["From Colocation to Exfiltration: Practical Cache Side-Channel Attacks in the Modern Public Cloud"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7231-7416","authenticated-orcid":false,"given":"Zirui Neil","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5586-2615","authenticated-orcid":false,"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-5995","authenticated-orcid":false,"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2595-5228","authenticated-orcid":false,"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"263","reference":[{"volume-title":"The security design of the AWS Nitro system: AWS whitepaper","year":"2022","key":"ref1"},{"volume-title":"Cloud run: Container to production in seconds","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"volume-title":"The container security platform","year":"2023","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2015.43"},{"key":"ref6","first-page":"2906","article-title":"PrimeScope: Overcoming the observer effect for high-precision cache contention attacks","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Purnal","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00042"},{"key":"ref9","first-page":"719","article-title":"FLUSHRELOAD: A high resolution, low noise, L3 cache side-channel attack","volume-title":"Proc. 23rd USENIX Conf. Secur. Symp.","author":"Yarom","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3617232.3624867"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640403"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/40\/11176860\/11018321-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/40\/11176860\/11018321.pdf?arnumber=11018321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:15:46Z","timestamp":1759234546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11018321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":11,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mm.2025.3574715","relation":{},"ISSN":["0272-1732","1937-4143"],"issn-type":[{"type":"print","value":"0272-1732"},{"type":"electronic","value":"1937-4143"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}