{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:08:57Z","timestamp":1775837337212,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1018496CNS-0958501"],"award-info":[{"award-number":["CNS-1018496CNS-0958501"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-09-1-0137"],"award-info":[{"award-number":["FA8750-09-1-0137"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:p>We propose a flexibly-partitioned cache design that either drastically weakens or completely eliminates cache-based side channel attacks. The proposed Non-Monopolizable (NoMo) cache dynamically reserves cache lines for active threads and prevents other co-executing threads from evicting reserved lines. Unreserved lines remain available for dynamic sharing among threads. NoMo requires only simple modifications to the cache replacement logic, making it straightforward to adopt. It requires no software support enabling it to automatically protect pre-existing binaries. NoMo results in performance degradation of about 1% on average. We demonstrate that NoMo can provide strong security guarantees for the AES and Blowfish encryption algorithms.<\/jats:p>","DOI":"10.1145\/2086696.2086714","type":"journal-article","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T16:47:14Z","timestamp":1327423634000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":150,"title":["Non-monopolizable caches"],"prefix":"10.1145","volume":"8","author":[{"given":"Leonid","family":"Domnitser","sequence":"first","affiliation":[{"name":"State University of New York at Binghamton, Binghamton"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aamer","family":"Jaleel","sequence":"additional","affiliation":[{"name":"Intel Corporation, VSSAD"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jason","family":"Loew","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dmitry","family":"Ponomarev","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2012,1,26]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Aciicmez O. and Koh C. 2006. Trace-driven cache attacks on aes. Cryptology ePrint Archive rep. 2006\/138.  Aciicmez O. and Koh C. 2006. Trace-driven cache attacks on aes. Cryptology ePrint Archive rep. 2006\/138."},{"key":"e_1_2_1_2_1","unstructured":"ARM. 2010--2011. Cortex-r5 and cortex-r5f: A technical reference manual revision r1p1. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0460c\/DDI0460C_cortexr5_trm.pdf (accessed 7\/11).  ARM. 2010--2011. Cortex-r5 and cortex-r5f: A technical reference manual revision r1p1. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0460c\/DDI0460C_cortexr5_trm.pdf (accessed 7\/11)."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Backes M.","unstructured":"Backes , M. , Durmuth , M. , Gerling , S. , Pinkal , M. , and Sporleder , C . 2010. Acoustic side-channel attacks on printers . In Proceedings of the USENIX Security Symposium. Backes, M., Durmuth, M., Gerling, S., Pinkal, M., and Sporleder, C. 2010. Acoustic side-channel attacks on printers. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_2_1_5_1","unstructured":"Bernstein D. 2005. Cache-timing attacks on AES. http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf.  Bernstein D. 2005. Cache-timing attacks on AES. http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"e_1_2_1_7_1","unstructured":"Blowfish. 2009. The blowfish encryption algorithm. http:\/\/www.schneier.com\/blowfish.html.  Blowfish. 2009. The blowfish encryption algorithm. http:\/\/www.schneier.com\/blowfish.html."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"e_1_2_1_9_1","unstructured":"Brickell E. Graunke G. Neve M. and Seifert J. 2006. Software mitigation to hedge aes against cache-based software side channel vulnerabilities. IACR ePrint Archive rep. 2006\/052.  Brickell E. Graunke G. Neve M. and Seifert J. 2006. Software mitigation to hedge aes against cache-based software side channel vulnerabilities. IACR ePrint Archive rep. 2006\/052."},{"key":"e_1_2_1_10_1","unstructured":"Canteaut A. Lauradoux C. and Seznec A. 2006. Understanding cache attacks. INRIA Tech. rep. ftp:\/\/ftp.inria.fr\/INRIA\/publication\/publi-pdf\/RR\/RR-5881.pdf.  Canteaut A. Lauradoux C. and Seznec A. 2006. Understanding cache attacks. INRIA Tech. rep. ftp:\/\/ftp.inria.fr\/INRIA\/publication\/publi-pdf\/RR\/RR-5881.pdf."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer.   Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the CHES.","author":"Goubin L.","unstructured":"Goubin , L. and Patarin , J . 1999. DES and differential power analysis . In Proceedings of the CHES. Goubin, L. and Patarin, J. 1999. DES and differential power analysis. In Proceedings of the CHES."},{"key":"e_1_2_1_13_1","unstructured":"Gueron S. 2008. Advanced encryption standard (AES) instruction set. White paper Intel.  Gueron S. 2008. Advanced encryption standard (AES) instruction set. White paper Intel."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815971"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 5th European Symposium on Research in Computer Security. 97--110","author":"Kelsey J.","unstructured":"Kelsey , J. , Shneier , B. , Wagner , D. , and Hall , C . 1998. Side channel cryptanalysis of product ciphers . In Proceedings of the 5th European Symposium on Research in Computer Security. 97--110 . Kelsey, J., Shneier, B., Wagner, D., and Hall, C. 1998. Side channel cryptanalysis of product ciphers. In Proceedings of the 5th European Symposium on Research in Computer Security. 97--110."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Keramidas G. Antonopoulos A. Serpanos D. and Kaxiras S. 2008. Non-deterministic caches: A simple and effective defense against side channel attacks. Design Automation Embedd. Syst.  Keramidas G. Antonopoulos A. Serpanos D. and Kaxiras S. 2008. Non-deterministic caches: A simple and effective defense against side channel attacks. Design Automation Embedd. Syst.","DOI":"10.1007\/s10617-008-9018-y"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Symposium on High Performance Computer Architecture (HPCA).","author":"Kong J.","unstructured":"Kong , J. , Aclicmez , O. , Seifert , J. , and Zhou , H . 2009. Hardware-software integrated approaches to defend against software cache-based side channel attacks . In Proceedings of the International Symposium on High Performance Computer Architecture (HPCA). Kong, J., Aclicmez, O., Seifert, J., and Zhou, H. 2009. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In Proceedings of the International Symposium on High Performance Computer Architecture (HPCA)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315282"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2010.5521153"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the International Symposium on Performance Analysis of Systems and Software.","author":"Luo K.","unstructured":"Luo , K. and Franklin , M . 2001. Balancing throughput and fairness in smt processors . In Proceedings of the International Symposium on Performance Analysis of Systems and Software. Luo, K. and Franklin, M. 2001. Balancing throughput and fairness in smt processors. In Proceedings of the International Symposium on Performance Analysis of Systems and Software."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188366"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of CHES.","author":"May D.","unstructured":"May , D. , Muller , H. , and Smart , N . 2001. Randomized register renaming to foil DPA . In Proceedings of CHES. May, D., Muller, H., and Smart, N. 2001. Randomized register renaming to foil DPA. In Proceedings of CHES."},{"key":"e_1_2_1_24_1","unstructured":"Mibench. 2009. The MiBench benchmark suite. http:\/\/www.eecs.umich.edu\/mibench\/.  Mibench. 2009. The MiBench benchmark suite. http:\/\/www.eecs.umich.edu\/mibench\/."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the Theory of Cryptography Conference.","author":"Micali S.","unstructured":"Micali , S. and Reyzin , L . 2004. Physically observable cryptography . In Proceedings of the Theory of Cryptography Conference. Micali, S. and Reyzin, L. 2004. Physically observable cryptography. In Proceedings of the Theory of Cryptography Conference."},{"key":"e_1_2_1_26_1","unstructured":"NEHALEM. 2009. First the tick now the tock: Intel microarchitecture (nehalem). http:\/\/www.intel.com\/technology\/architecture-silicon\/next-gen\/319724.pdf.  NEHALEM. 2009. First the tick now the tock: Intel microarchitecture (nehalem). http:\/\/www.intel.com\/technology\/architecture-silicon\/next-gen\/319724.pdf."},{"key":"e_1_2_1_27_1","unstructured":"Osvik D. Shamir A. and Tromer E. 2005. Cache attacks and countermeasures: the case of aes. Cryptology ePrint Archive rep. 2005\/271.  Osvik D. Shamir A. and Tromer E. 2005. Cache attacks and countermeasures: the case of aes. Cryptology ePrint Archive rep. 2005\/271."},{"key":"e_1_2_1_28_1","unstructured":"Page D. 2005. Partitioned cache architecture as a side-channel defense mechanism. Cryptology ePrint Archive.  Page D. 2005. Partitioned cache architecture as a side-channel defense mechanism. Cryptology ePrint Archive."},{"key":"e_1_2_1_29_1","unstructured":"Percival C. 2005. Cache missing for fun and profit. http:\/\/www.daemonology.net\/papers\/htt.pdf.  Percival C. 2005. Cache missing for fun and profit. http:\/\/www.daemonology.net\/papers\/htt.pdf."},{"key":"e_1_2_1_30_1","unstructured":"Pinpoints. 2009. Pinpoints home page. http:\/\/www.cs.virginia.edu\/wiki\/pin\/index.php\/PinPoints.  Pinpoints. 2009. Pinpoints home page. http:\/\/www.cs.virginia.edu\/wiki\/pin\/index.php\/PinPoints."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.49"},{"key":"e_1_2_1_32_1","unstructured":"Random. 2009. Random.org. http:\/\/www.random.org\/.  Random. 2009. Random.org. http:\/\/www.random.org\/."},{"key":"e_1_2_1_33_1","unstructured":"Side. 2009. Side channel attacks database. http:\/\/www.sidechannelattacks.com.  Side. 2009. Side channel attacks database. http:\/\/www.sidechannelattacks.com."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1241601.1241625"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_3"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Computing and Systems (PDCS'01)","author":"Suh E.","unstructured":"Suh , E. , Rudolph , L. , and Devadas , S . 2001. Dynamic cache partitioning for simultaneous multithreading systems . In Proceedings of the International Conference on Parallel and Distributed Computing and Systems (PDCS'01) . Suh, E., Rudolph, L., and Devadas, S. 2001. Dynamic cache partitioning for simultaneous multithreading systems. In Proceedings of the International Conference on Parallel and Distributed Computing and Systems (PDCS'01)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2724966.2725064"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Cryptographic Hardware and Embedded Systems (CHES) Workshop. 62--76","author":"Tsunoo Y.","unstructured":"Tsunoo , Y. , Saito , T. , Suzaki , T. , Shigeri , M. , and Miyauchi , H . 2003. Crypronalysis of des implemented on computers with cache . In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES) Workshop. 62--76 . Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., and Miyauchi, H. 2003. Crypronalysis of des implemented on computers with cache. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES) Workshop. 62--76."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the ICITA Conference.","author":"Tsunoo Y.","unstructured":"Tsunoo , Y. , Tsujihara , E. , Minematsu , K. , and Miyauchi , H . 2002. Crypronalysis of block ciphers implemented on computers with cache . In Proceedings of the ICITA Conference. Tsunoo, Y., Tsujihara, E., Minematsu, K., and Miyauchi, H. 2002. Crypronalysis of block ciphers implemented on computers with cache. In Proceedings of the ICITA Conference."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555778"},{"key":"e_1_2_1_43_1","unstructured":"Zhao X. and Wang T. 2010. Improved cache trace attack on AES and CLEFIA by considering cache miss and s-box misalignment. Cryptology ePrint Archive rep. 2010\/056.  Zhao X. and Wang T. 2010. Improved cache trace attack on AES and CLEFIA by considering cache miss and s-box misalignment. Cryptology ePrint Archive rep. 2010\/056."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1882011.1882027"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2086696.2086714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2086696.2086714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:42Z","timestamp":1750241202000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2086696.2086714"}},"subtitle":["Low-complexity mitigation of cache side channel attacks"],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1145\/2086696.2086714"],"URL":"https:\/\/doi.org\/10.1145\/2086696.2086714","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]},"assertion":[{"value":"2011-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-01-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}