{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:20Z","timestamp":1772164100700,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1422088"],"award-info":[{"award-number":["CNS-1422088"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,4]]},"DOI":"10.1145\/3037697.3037703","type":"proceedings-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T08:47:40Z","timestamp":1491382060000},"page":"599-613","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Bolt"],"prefix":"10.1145","author":[{"given":"Christina","family":"Delimitrou","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Christos","family":"Kozyrakis","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon ec2. http:\/\/aws.amazon.com\/ec2\/.  Amazon ec2. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1643608"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the International Cryptographic Hardware and Embedded Systems Workshop (CHES)","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger , Joop van de Pol, Nigel P. Smart, and Yuval Yarom. \"ooh aah... just a little bit\" : A small amount of side channel can go a long way . In Proc. of the International Cryptographic Hardware and Embedded Systems Workshop (CHES) . Busan, South Korea , 2014 . Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. \"ooh aah... just a little bit\" : A small amount of side channel can go a long way. In Proc. of the International Cryptographic Hardware and Embedded Systems Workshop (CHES). Busan, South Korea, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810085.1810113"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_7_1","volume-title":"SOCC Keynote","author":"Brewer Eric","year":"2015","unstructured":"Eric Brewer . Kubernetes : The path to cloud native. http:\/\/goo.gl\/QgkzYB , SOCC Keynote , August 2015 . Eric Brewer. Kubernetes: The path to cloud native. http:\/\/goo.gl\/QgkzYB, SOCC Keynote, August 2015."},{"key":"e_1_3_2_1_8_1","unstructured":"Martin A. Brown. Traffic control howto. http:\/\/linux-ip.net\/articles\/Traffic-Control-HOWTO\/.  Martin A. Brown. Traffic control howto. http:\/\/linux-ip.net\/articles\/Traffic-Control-HOWTO\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021240730564"},{"key":"e_1_3_2_1_10_1","unstructured":"Apache cassandra. http:\/\/cassandra.apache.org\/.  Apache cassandra. http:\/\/cassandra.apache.org\/."},{"key":"e_1_3_2_1_11_1","volume-title":"September","author":"Developer's Manual Architecture Software","year":"2014","unstructured":"InteltextcircledR64 and IA-32 Architecture Software Developer's Manual , vol3B: System Programming Guide, Part 2 , September 2014 . InteltextcircledR64 and IA-32 Architecture Software Developer's Manual, vol3B: System Programming Guide, Part 2, September 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330555.1330556"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 12th Conference on USENIX Security","author":"Scott","year":"2003","unstructured":"Scott A. Crosby and Dan S. Wallach. Denial of service via algorithmic complexity attacks . In Proceedings of the 12th Conference on USENIX Security . Washington, DC , 2003 . Scott A. Crosby and Dan S. Wallach. Denial of service via algorithmic complexity attacks. In Proceedings of the 12th Conference on USENIX Security. Washington, DC, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of i-Society","author":"Darwish Marwan","year":"2013","unstructured":"Marwan Darwish , Abdelkader Ouda , and Luiz Fernando Capretz . Cloud-based ddos attacks and defenses . In Proc. of i-Society . Toronto, ON , 2013 . Marwan Darwish, Abdelkader Ouda, and Luiz Fernando Capretz. Cloud-based ddos attacks and defenses. In Proc. of i-Society. Toronto, ON, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2013.6704667"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451125"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541941"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872365"},{"key":"e_1_3_2_1_19_1","unstructured":"Jake Edge. Denial of service via hash collisions. http:\/\/lwn.net\/Articles\/474912\/ January 2012.  Jake Edge. Denial of service via hash collisions. http:\/\/lwn.net\/Articles\/474912\/ January 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391249"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2007.4336197"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409540.1409544"},{"issue":"124","key":"e_1_3_2_1_23_1","article-title":"Distributed caching with memcached","volume":"2004","author":"Fitzpatrick Brad","year":"2004","unstructured":"Brad Fitzpatrick . Distributed caching with memcached . In Linux Journal , Volume 2004 , Issue 124 , 2004 . Brad Fitzpatrick. Distributed caching with memcached. In Linux Journal, Volume 2004, Issue 124, 2004.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_25_1","unstructured":"Google container engine. https:\/\/cloud.google.com\/container-engine.  Google container engine. https:\/\/cloud.google.com\/container-engine."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639735"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40576-1_25"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517491"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of NSDI","author":"Hindman Ben","year":"2011","unstructured":"Ben Hindman , Andy Konwinski , Matei Zaharia , Ali Ghodsi , Anthony D. Joseph , Randy Katz , Scott Shenker , and Ion Stoica . Mesos : A platform for fine-grained resource sharing in the data center . In Proceedings of NSDI . Boston, MA , 2011 . Ben Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy Katz, Scott Shenker, and Ion Stoica. Mesos: A platform for fine-grained resource sharing in the data center. In Proceedings of NSDI. Boston, MA, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2011.22"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Jeyakumar Vimalkumar","year":"2013","unstructured":"Vimalkumar Jeyakumar , Mohammad Alizadeh , David Mazi\u00e8res , Balaji Prabhakar , Changhoon Kim , and Albert Greenberg . Eyeq : Practical network performance isolation at the edge . In Proc. of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI) . Lombard, IL , 2013 . Vimalkumar Jeyakumar, Mohammad Alizadeh, David Mazi\u00e8res, Balaji Prabhakar, Changhoon Kim, and Albert Greenberg. Eyeq: Practical network performance isolation at the edge. In Proc. of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI). Lombard, IL, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.84"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00011414"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.118"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592821"},{"key":"e_1_3_2_1_38_1","unstructured":"Host server cpu utilization in amazon ec2 cloud. http:\/\/goo.gl\/2LTx4T.  Host server cpu utilization in amazon ec2 cloud. http:\/\/goo.gl\/2LTx4T."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.9.4.1005-1013"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853237"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2749475"},{"key":"e_1_3_2_1_43_1","unstructured":"Mahout. http:\/\/mahout.apache.org\/.  Mahout. http:\/\/mahout.apache.org\/."},{"key":"e_1_3_2_1_44_1","unstructured":"Dave Mangot. Ec2 variability: The numbers revealed. http:\/\/tech.mangot.com\/roller\/dave\/entry\/ec2_variability_the_numbers_re%vealed.  Dave Mangot. Ec2 variability: The numbers revealed. http:\/\/tech.mangot.com\/roller\/dave\/entry\/ec2_variability_the_numbers_re%vealed."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485975"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000103"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of 16th USENIX Security Symposium on USENIX Security Symposium (SS)","author":"Moscibroda Thomas","year":"2007","unstructured":"Thomas Moscibroda and Onur Mutlu . Memory performance attacks: Denial of memory service in multi-core systems . In Proc. of 16th USENIX Security Symposium on USENIX Security Symposium (SS) . Boston, MA , 2007 . Thomas Moscibroda and Onur Mutlu. Memory performance attacks: Denial of memory service in multi-core systems. In Proc. of 16th USENIX Security Symposium on USENIX Security Symposium (SS). Boston, MA, 2007."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of EuroSys","author":"Nathuji Ripal","year":"2010","unstructured":"Ripal Nathuji , Aman Kansal , and Alireza Ghaffarkhah . Q-clouds : Managing performance interference effects for qos-aware clouds . In Proceedings of EuroSys . Paris,France , 2010 . Ripal Nathuji, Aman Kansal, and Alireza Ghaffarkhah. Q-clouds: Managing performance interference effects for qos-aware clouds. In Proceedings of EuroSys. Paris,France, 2010."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12636-9_9"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.49"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655019"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.47"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000073"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920902"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465386"},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. of the USENIX Conference on Hot Topics in Cloud Computing (HotCloud)","author":"Shieh Alan","year":"2010","unstructured":"Alan Shieh , Srikanth Kandula , Albert Greenberg , and Changhoon Kim . Seawall : Performance isolation for cloud datacenter networks . In Proc. of the USENIX Conference on Hot Topics in Cloud Computing (HotCloud) . Boston, MA , 2010 . Alan Shieh, Srikanth Kandula, Albert Greenberg, and Changhoon Kim. Seawall: Performance isolation for cloud datacenter networks. In Proc. of the USENIX Conference on Hot Topics in Cloud Computing (HotCloud). Boston, MA, 2010."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387914"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1362903.1362920"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of the 23rd Usenix Security Symposium","author":"Varadarajan Venkatanathan","year":"2014","unstructured":"Venkatanathan Varadarajan , Thomas Ristenpart , and Michael Swift . Scheduler-based defenses against cross-vm side-channels . In Proc. of the 23rd Usenix Security Symposium . San Diego, CA , 2014 . Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift. Scheduler-based defenses against cross-vm side-channels. In Proc. of the 23rd Usenix Security Symposium. San Diego, CA, 2014."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831201"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.10.2397-2403"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the 11th ACM SIGPLAN\/SIGOPS international conference on Virtual Execution Environments (VEE)","author":"Wang Hui","year":"2015","unstructured":"Hui Wang , Canturk Isci , Lavanya Subramanian , Jongmoo Choi , Depei Qian , and Onur Mutlu . A-drm : Architecture-aware distributed resource management of virtualized clusters . In Proceedings of the 11th ACM SIGPLAN\/SIGOPS international conference on Virtual Execution Environments (VEE) . Istanbul, Turkey , 2015 . Hui Wang, Canturk Isci, Lavanya Subramanian, Jongmoo Choi, Depei Qian, and Onur Mutlu. A-drm: Architecture-aware distributed resource management of virtualized clusters. In Proceedings of the 11th ACM SIGPLAN\/SIGOPS international conference on Virtual Execution Environments (VEE). Istanbul, Turkey, 2015."},{"key":"e_1_3_2_1_69_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten Ian H.","unstructured":"Ian H. Witten , Eibe Frank , and Geoffrey Holmes . Data Mining: Practical Machine Learning Tools and Techniques . 3 rd Edition. Ian H. Witten, Eibe Frank, and Geoffrey Holmes. Data Mining: Practical Machine Learning Tools and Techniques. 3rd Edition.","edition":"3"},{"key":"e_1_3_2_1_70_1","volume-title":"Proc. of the 21st USENIX Conference on Security Symposium (USENIX Security)","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . Whispers in the hyper-space: High-speed covert channel attacks in the cloud . In Proc. of the 21st USENIX Conference on Security Symposium (USENIX Security) . Bellevue, WA , 2012 . Zhenyu Wu, Zhang Xu, and Haining Wang. Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In Proc. of the 21st USENIX Conference on Security Symposium (USENIX Security). Bellevue, WA, 2012."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831202"},{"key":"e_1_3_2_1_73_1","unstructured":"Yuval Yarom and Katrina Falkner. Flush  Yuval Yarom and Katrina Falkner. Flush"},{"key":"e_1_3_2_1_74_1","volume-title":"Proc. of the 23rd Usenix Security Symposium","year":"2014","unstructured":"reload : a high resolution, low noise, l3 cache side-channel attack . In Proc. of the 23rd Usenix Security Symposium . San Diego, CA , 2014 . reload: a high resolution, low noise, l3 cache side-channel attack. In Proc. of the 23rd Usenix Security Symposium. San Diego, CA, 2014."},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of NSDI","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauly , Michael J. Franklin , Scott Shenker , and Ion Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In Proceedings of NSDI . San Jose, CA , 2012 . Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael J. Franklin, Scott Shenker, and Ion Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of NSDI. San Jose, CA, 2012."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516741"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130474"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.40"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736036"}],"event":{"name":"ASPLOS '17: Architectural Support for Programming Languages and Operating Systems","location":"Xi'an China","acronym":"ASPLOS '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037703","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037703","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:50:26Z","timestamp":1750204226000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037703"}},"subtitle":["I Know What You Did Last Summer... In The Cloud"],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":82,"alternative-id":["10.1145\/3037697.3037703","10.1145\/3037697"],"URL":"https:\/\/doi.org\/10.1145\/3037697.3037703","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093336.3037703","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/3093337.3037703","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,4,4]]},"assertion":[{"value":"2017-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}