{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:30Z","timestamp":1750306650739,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["10041313","KI001810041244"],"award-info":[{"award-number":["10041313","KI001810041244"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IT R&D program of MSIP\/IITP","award":["10041313","KI001810041244"],"award-info":[{"award-number":["10041313","KI001810041244"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660290","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"358-368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Vulnerability in Processor-Interconnect Router Design"],"prefix":"10.1145","author":[{"given":"WonJun","family":"Song","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"John","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Jae-Wook","family":"Lee","sequence":"additional","affiliation":[{"name":"SungKyunKwan University, Suwon, South Korea"}]},{"given":"Dennis","family":"Abts","sequence":"additional","affiliation":[{"name":"Google Inc., Madison, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tile Processor User Architecture Manual. http:\/\/www.tilera.com\/scm\/docs\/UG101-User-Architecture-Reference.pdf.  Tile Processor User Architecture Manual. http:\/\/www.tilera.com\/scm\/docs\/UG101-User-Architecture-Reference.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Hypertransport System Architecture","author":"Anderson D.","year":"2003","unstructured":"D. Anderson and J. Trodden . Hypertransport System Architecture . Addison-Wesley Professional , 2003 . D. Anderson and J. Trodden. Hypertransport System Architecture. Addison-Wesley Professional, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2008.4523070"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.65"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516714"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.43"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.127260"},{"key":"e_1_3_2_1_8_1","volume-title":"Morgan Kaufmann","author":"Dally W. J.","year":"2004","unstructured":"W. J. Dally and B. Towles . Principles and Practices of Interconnection Networks . Morgan Kaufmann , 2004 . W. J. Dally and B. Towles. Principles and Practices of Interconnection Networks. Morgan Kaufmann, 2004."},{"key":"e_1_3_2_1_9_1","unstructured":"Dell. PowerEdge R815 Rack Server. http:\/\/www.dell.com\/us\/business\/p\/poweredge-r815\/pd.  Dell. PowerEdge R815 Rack Server. http:\/\/www.dell.com\/us\/business\/p\/poweredge-r815\/pd."},{"key":"e_1_3_2_1_10_1","volume-title":"BIOS and Kernel Developer Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors","author":"Devices A. M.","year":"2012","unstructured":"A. M. Devices . BIOS and Kernel Developer Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors , 2012 . A. M. Devices. BIOS and Kernel Developer Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors, 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460892"},{"key":"e_1_3_2_1_12_1","volume-title":"Oct","author":"Galles M. B.","year":"1997","unstructured":"M. B. Galles and R. E. Newhall . System and method for network exploration and access , Oct 1997 . US Patent 5,682,479. M. B. Galles and R. E. Newhall. System and method for network exploration and access, Oct 1997. US Patent 5,682,479."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-36400-5_17","volume-title":"Cryptographic Hardware and Embedded Systems (CHES)","author":"Huang A.","year":"2003","unstructured":"A. Huang . Keeping secrets in hardware: The microsoft xboxtm case study . In Cryptographic Hardware and Embedded Systems (CHES) , volume 2523 of Lecture Notes in Computer Science , pages 213 -- 227 . Springer Berlin Heidelberg , Feb 2003 . A. Huang. Keeping secrets in hardware: The microsoft xboxtm case study. In Cryptographic Hardware and Embedded Systems (CHES), volume 2523 of Lecture Notes in Computer Science, pages 213--227. Springer Berlin Heidelberg, Feb 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2479942.2479948"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. 5520 Chipset and Intel 5520 Chipset. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/datasheets\/5520--5500-chipset-ioh-datasheet.pdf Mar 2009.  Intel. 5520 Chipset and Intel 5520 Chipset. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/datasheets\/5520--5500-chipset-ioh-datasheet.pdf Mar 2009."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel. QuickPath Interconnect Overview. http:\/\/www.hotchips.org\/wp-content\/uploads\/hc_archives\/hc21\/1_sun\/HC21.23.1. SystemInterconnectTutorial-Epub\/HC21.23.120. Safranek-Intel-QPI.pdf Aug 2012. Hotchips.  Intel. QuickPath Interconnect Overview. http:\/\/www.hotchips.org\/wp-content\/uploads\/hc_archives\/hc21\/1_sun\/HC21.23.1. SystemInterconnectTutorial-Epub\/HC21.23.120. Safranek-Intel-QPI.pdf Aug 2012. Hotchips."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. Xeon processor e7--8800\/4800\/2800 v2 product family. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/datasheets\/xeon-e7-v2-datasheet-vol-1.pdf Feb 2014.  Intel. Xeon processor e7--8800\/4800\/2800 v2 product family. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/datasheets\/xeon-e7-v2-datasheet-vol-1.pdf Feb 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"Dec","author":"Intel H. P.","year":"2005","unstructured":"H. P. Intel . Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. http:\/\/www.intel.com\/content\/dam\/ www\/public\/us\/en\/documents\/articles\/acpi-config-power-interface-spec.pdf , Dec 2005 . H. P. Intel. Microsoft, Phoenix, and Toshiba.Advanced configuration and power interface specification. http:\/\/www.intel.com\/content\/dam\/ www\/public\/us\/en\/documents\/articles\/acpi-config-power-interface-spec.pdf, Dec 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491899.2465557"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet, SF, CA","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. P. Mankins , and W. T. Strayer . Decoy routing: Toward unblockable internet communication . In USENIX Workshop on Free and Open Communications on the Internet, SF, CA , Aug 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In USENIX Workshop on Free and Open Communications on the Internet, SF, CA, Aug 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 16 USENIX Security Symposium","author":"Kauer B.","year":"2007","unstructured":"B. Kauer . OSLO : Improving the security of Trusted Computing . In Proceedings of the 16 USENIX Security Symposium , Boston, MA , Aug 2007 . B. Kauer. OSLO: Improving the security of Trusted Computing. In Proceedings of the 16 USENIX Security Symposium, Boston, MA, Aug 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"Jun","author":"Keck D. A.","year":"2004","unstructured":"D. A. Keck and P. Devriendt . System and method for programming hypertransport routing tables on multiprocessor systems , Jun 2004 . US Patent 20,040,122,973. D. A. Keck and P. Devriendt. System and method for programming hypertransport routing tables on multiprocessor systems, Jun 2004. US Patent 20,040,122,973."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/974104.974105"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2009.5071477"},{"key":"e_1_3_2_1_26_1","volume-title":"Linux Symposium","author":"Lameter C.","year":"2006","unstructured":"C. Lameter . Local and remote memory: Memory in a Linux\/NUMA system . In Linux Symposium , Ottawa, Ontario Canada , Jul 2006 . C. Lameter. Local and remote memory: Memory in a Linux\/NUMA system. In Linux Symposium, Ottawa, Ontario Canada, Jul 2006."},{"key":"e_1_3_2_1_27_1","volume-title":"Black Hat Europe","author":"Lineberry A.","year":"2009","unstructured":"A. Lineberry . Malicious Code Injection via\/dev\/mem . Black Hat Europe , Mar 2009 . A. Lineberry. Malicious Code Injection via\/dev\/mem. Black Hat Europe, Mar 2009."},{"key":"e_1_3_2_1_28_1","first-page":"257","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Moscibroda T.","year":"2007","unstructured":"T. Moscibroda and O. Mutlu . Memory Performance Attacks: Denial of Memory Service in Multi-core Systems . In Proceedings of 16th USENIX Security Symposium , pages 257 -- 274 , Boston, MA , Aug 2007 . T. Moscibroda and O. Mutlu. Memory Performance Attacks: Denial of Memory Service in Multi-core Systems. In Proceedings of 16th USENIX Security Symposium, pages 257--274, Boston, MA, Aug 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EPEPS.2010.5642789"},{"key":"e_1_3_2_1_30_1","volume-title":"Overview of Linux Vulnerabilities. In 2nd International Conference on Soft Computing in Information Communication Technology. Atlantis Press","author":"Niu S.","year":"2014","unstructured":"S. Niu , J. Mo , Z. Zhang , and Z. Lv . Overview of Linux Vulnerabilities. In 2nd International Conference on Soft Computing in Information Communication Technology. Atlantis Press , May 2014 . S. Niu, J. Mo, Z. Zhang, and Z. Lv. Overview of Linux Vulnerabilities. In 2nd International Conference on Soft Computing in Information Communication Technology. Atlantis Press, May 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.40"},{"key":"e_1_3_2_1_33_1","volume-title":"Intel Developer Forum","author":"Sumrall N.","year":"2003","unstructured":"N. Sumrall and M. Novoa . Trusted Computing Group (TCG) and the TPM 1.2 Specification . In Intel Developer Forum , 2003 . N. Sumrall and M. Novoa. Trusted Computing Group (TCG) and the TPM 1.2 Specification. In Intel Developer Forum, 2003."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2012.24"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485972"},{"key":"e_1_3_2_1_37_1","volume-title":"Invisible Things Lab","author":"Wojtczuk R.","year":"2010","unstructured":"R. Wojtczuk . Exploiting large memory management vulnerabilities in Xorg server running on Linux . Invisible Things Lab , Aug 2010 . R. Wojtczuk. Exploiting large memory management vulnerabilities in Xorg server running on Linux. Invisible Things Lab, Aug 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427495"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":38,"alternative-id":["10.1145\/2660267.2660290","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660290","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}