{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:37:41Z","timestamp":1777106261651,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1566444"],"award-info":[{"award-number":["1566444"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978360","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"858-870","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices"],"prefix":"10.1145","author":[{"given":"Xiaokuan","family":"Zhang","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Yuan","family":"Xiao","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/widget\/Editor","year":"2016","unstructured":"Android source code. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/widget\/Editor.java. Retrieved in May 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM architecture reference manual. http:\/\/infocenter.arm.com\/. ARMv8 for ARMv8-A architecture profile beta."},{"key":"e_1_3_2_1_3_1","unstructured":"ARM architecture reference manual. http:\/\/infocenter.arm.com\/. ARMv7 for ARMv7-A architecture profile."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM CoreLink CCI-400 Cache Coherent Interconnect Technical Reference Manual. http:\/\/infocenter.arm.com\/. Revision: r1p5."},{"key":"e_1_3_2_1_5_1","unstructured":"ARM Cortex-A15 MPCore Processor. http:\/\/infocenter.arm.com\/. Revision: r4p0."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM Cortex-A57 MPCore Processor. http:\/\/infocenter.arm.com\/. Revision: r1p3."},{"key":"e_1_3_2_1_7_1","unstructured":"Event codes. https:\/\/www.kernel.org\/doc\/Documentation\/input\/event-codes.txt. event codes - The Linux Kernel Archives."},{"key":"e_1_3_2_1_8_1","unstructured":"GDB documentation. http:\/\/www.gnu.org\/software\/gdb\/documentation\/."},{"key":"e_1_3_2_1_9_1","volume-title":"do not leak physical addresses to non-privileged userspace. https:\/\/lwn.net\/Articles\/642074\/. Retrieved","year":"2016","unstructured":"pagemap: do not leak physical addresses to non-privileged userspace. https:\/\/lwn.net\/Articles\/642074\/. Retrieved in May 2016."},{"key":"e_1_3_2_1_10_1","unstructured":"Programmer's Guide for ARMv8-A. http:\/\/infocenter.arm.com\/. Version 1.0."},{"key":"e_1_3_2_1_11_1","volume-title":"pagemap: do not leak physical addresses to non-privileged userspace. https:\/\/android-review.googlesource.com\/#\/c\/182766\/. Retrieved","year":"2016","unstructured":"Upstream: pagemap: do not leak physical addresses to non-privileged userspace. https:\/\/android-review.googlesource.com\/#\/c\/182766\/. Retrieved in Aug. 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881522"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028040.2028049"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671291"},{"key":"e_1_3_2_1_20_1","unstructured":"R. Delgado. Arm-based servers: The next evolution of the cloud? http:\/\/www.cloudcomputing-news.net\/news\/2015\/apr\/17\/arm-based-servers-next-evolution-cloud\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831200"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_25_1","unstructured":"M. S. Inci B. Gulmezoglu G. Irazoqui T. Eisenbarth and B. Sunar. Seriously get off my cloud! cross-vm rsa key recovery in a public cloud. Cryptology ePrint Archive Report 2015\/898 2015. http:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.52"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23049"},{"key":"e_1_3_2_1_32_1","volume-title":"25th USENIX Security Symposium","author":"Lipp M.","year":"2016","unstructured":"M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard. ARMageddon: Cache attacks on mobile devices. In 25th USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671292"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756516.1756531"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_38_1","volume-title":"2005 BSDCan","author":"Percival C.","year":"2005","unstructured":"C. Percival. Cache missing for fun and profit. In 2005 BSDCan, 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_1_40_1","unstructured":"H. Rydberg. Multi-touch (mt) protocol. Linux kernel documentation. https:\/\/www.kernel.org\/doc\/Documentation\/input\/multi-touch-protocol.txt."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_42_1","unstructured":"A. L. Shimpi. Answered by the experts: Arm's cortex a53 lead architect peter greenhalgh. http:\/\/www.anandtech.com\/show\/7591\/answered-by-the-experts-arms-cortex-a53-lead-architect -peter-greenhalgh."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43826-8_3"},{"key":"e_1_3_2_1_44_1","volume-title":"4th International Workshop on Constructive Side-Channel Analysis and Secure Design","author":"Spreitzer R.","year":"2013","unstructured":"R. Spreitzer and T. Plos. In 4th International Workshop on Constructive Side-Channel Analysis and Secure Design, 2013."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_53"},{"issue":"2","key":"e_1_3_2_1_46_1","first-page":"37","volume":"23","author":"Tromer E.","year":"2010","unstructured":"E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on AES, and countermeasures. J. Cryptol., 23(2):37--71, Jan. 2010.","journal-title":"Efficient cache attacks on AES, and countermeasures. J. Cryptol."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_23"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130767"},{"key":"e_1_3_2_1_49_1","unstructured":"Y. Yarom and N. Benger. Recovering OpenSSL ECDSA nonces using the FLUSH"},{"key":"e_1_3_2_1_50_1","volume-title":"Cryptology ePrint Archive","author":"LOAD","year":"2014","unstructured":"RELOAD cache side-channel attack. In Cryptology ePrint Archive, 2014."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671271"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978324"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978360","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:20Z","timestamp":1763457860000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":56,"alternative-id":["10.1145\/2976749.2978360","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978360","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}