{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:09:35Z","timestamp":1772726975266,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3065843","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Preventing and detecting cache side-channel attacks in cloud computing"],"prefix":"10.1145","author":[{"given":"Younis A.","family":"Younis","sequence":"first","affiliation":[{"name":"Liverpool John Moores University, Liverpool, UK"}]},{"given":"Kashif","family":"Kifayat","sequence":"additional","affiliation":[{"name":"Liverpool John Moores University, Liverpool, UK"}]},{"given":"Abir","family":"Hussain","sequence":"additional","affiliation":[{"name":"Liverpool John Moores University, Liverpool, UK"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Mell and T. Grance \"The NIST definition of cloud computing \" NIST special publication 2011. {Online}. Available: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf. {Accessed: 15-Oct-2012}.  P. Mell and T. Grance \"The NIST definition of cloud computing \" NIST special publication 2011. {Online}. Available: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf. {Accessed: 15-Oct-2012}."},{"key":"e_1_3_2_1_2_1","unstructured":"K. Weins \"Cloud Computing Trends: 2016 State of the Cloud Survey \" 2016.  K. Weins \"Cloud Computing Trends: 2016 State of the Cloud Survey \" 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_18"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"O. Aci\u00e7mez and W. Schindler \"A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL \" in The Cryptopgraphers' Track at the RSA conference on Topics in cryptology (CT-RSA'08) 2008 pp. 256--273.   O. Aci\u00e7mez and W. Schindler \"A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL \" in The Cryptopgraphers' Track at the RSA conference on Topics in cryptology (CT-RSA'08) 2008 pp. 256--273.","DOI":"10.1007\/978-3-540-79263-5_16"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_7_1","unstructured":"T. Kim M. Peinado and G. Mainar-Ruiz \"Stealthmem: system-level protection against cache-based side channel attacks in the cloud \" in The 21st USENIX conference on Security symposium (Security'12) 2012 p. 16.   T. Kim M. Peinado and G. Mainar-Ruiz \"Stealthmem: system-level protection against cache-based side channel attacks in the cloud \" in The 21st USENIX conference on Security symposium (Security'12) 2012 p. 16."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.21"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516741"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2013.6496374"},{"key":"e_1_3_2_1_12_1","first-page":"1718","article-title":"A New Prime and Probe Cache Side-Channel Attack for Cloud Computing,\" in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing;","author":"Younis Y. A.","year":"2015","journal-title":"Pervasive Intelligence and Computing"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"O. Aci\u00e7mez B. Brumley and P. Grabher \"New results on instruction cache attacks \" in The 12th international conference on Cryptographic hardware and embedded systems (CHES'10) 2010 vol. 216499 pp. 110--124.   O. Aci\u00e7mez B. Brumley and P. Grabher \"New results on instruction cache attacks \" in The 12th international conference on Cryptographic hardware and embedded systems (CHES'10) 2010 vol. 216499 pp. 110--124.","DOI":"10.1007\/978-3-642-15031-9_8"},{"key":"e_1_3_2_1_14_1","unstructured":"Z. Wu Z. Xu and H. Wang \"Whispers in the hyper-space: High-speed covert channel attacks in the cloud \" in The 21st USENIX conference on Security symposium (Security'12) 2012 pp. 1--9.   Z. Wu Z. Xu and H. Wang \"Whispers in the hyper-space: High-speed covert channel attacks in the cloud \" in The 21st USENIX conference on Security symposium (Security'12) 2012 pp. 1--9."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.4"},{"key":"e_1_3_2_1_19_1","unstructured":"Y. Yarom and K. Falkner \"Flush + Reload: a High Resolution Low Noise L3 Cache Side-Channel Attack \" Cryptology ePrint Archive 2013. {Online}. Available: http:\/\/eprint.iacr.org\/. {Accessed: 02-Mar-2014}.  Y. Yarom and K. Falkner \"Flush + Reload: a High Resolution Low Noise L3 Cache Side-Channel Attack \" Cryptology ePrint Archive 2013. {Online}. Available: http:\/\/eprint.iacr.org\/. {Accessed: 02-Mar-2014}."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2358236"},{"key":"e_1_3_2_1_21_1","unstructured":"D. Bernstein \"OProfile overhead \" 2014. {Online}. Available: http:\/\/oprofile.sourceforge.net\/performance\/. {Accessed: 03-Feb-2015}.  D. Bernstein \"OProfile overhead \" 2014. {Online}. Available: http:\/\/oprofile.sourceforge.net\/performance\/. {Accessed: 03-Feb-2015}."}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","location":"Cambridge United Kingdom","acronym":"ICC '17"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3065843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3065843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:56Z","timestamp":1750220636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3065843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":21,"alternative-id":["10.1145\/3018896.3065843","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3065843","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}