{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:43Z","timestamp":1773193603186,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1218817"],"award-info":[{"award-number":["CNS-1218817"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,2]]},"DOI":"10.1145\/3052973.3052978","type":"proceedings-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T12:22:54Z","timestamp":1490962974000},"page":"253-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["DoS Attacks on Your Memory in Cloud"],"prefix":"10.1145","author":[{"given":"Tianwei","family":"Zhang","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ab - the apache software foundation. http:\/\/httpd.apache.org\/docs\/2.2\/programs\/ab.html.  Ab - the apache software foundation. http:\/\/httpd.apache.org\/docs\/2.2\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon CloudWatch. https:\/\/aws.amazon.com\/cloudwatch\/.  Amazon CloudWatch. https:\/\/aws.amazon.com\/cloudwatch\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon virtual private cloud. https:\/\/aws.amazon.com\/vpc\/.  Amazon virtual private cloud. https:\/\/aws.amazon.com\/vpc\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Application programming","author":"AMD","unstructured":"AMD architecture programmer's manual , volume 1 : Application programming . http:\/\/support.amd.com\/TechDocs\/24592.pdf. AMD architecture programmer's manual, volume 1: Application programming. http:\/\/support.amd.com\/TechDocs\/24592.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"Google Stackdriver. https:\/\/cloud.google.com\/stackdriver\/.  Google Stackdriver. https:\/\/cloud.google.com\/stackdriver\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Improving real-time performance by utilizing cache allocation technology. http:\/\/www.intel.com\/content\/www\/us\/en\/communications\/cache-allocation-technology-white-paper.html.  Improving real-time performance by utilizing cache allocation technology. http:\/\/www.intel.com\/content\/www\/us\/en\/communications\/cache-allocation-technology-white-paper.html."},{"key":"e_1_3_2_1_7_1","volume-title":"System programming guide","unstructured":"Intel 64 and IA-32 architectures software developer's manual , volume 3 : System programming guide . http:\/\/www.intel.com\/content\/www\/us\/en\/processors\/architectures-software-developer-manuals.html. Intel 64 and IA-32 architectures software developer's manual, volume 3: System programming guide. http:\/\/www.intel.com\/content\/www\/us\/en\/processors\/architectures-software-developer-manuals.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Magento: ecommerce software and ecommerce platform. http:\/\/www.magento.com\/.  Magento: ecommerce software and ecommerce platform. http:\/\/www.magento.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"memtier benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark.  memtier benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark."},{"key":"e_1_3_2_1_10_1","unstructured":"Microsoft Azure Application Insights. https:\/\/azure.microsoft.com\/en-us\/services\/application-insights\/.  Microsoft Azure Application Insights. https:\/\/azure.microsoft.com\/en-us\/services\/application-insights\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Sysbench: a system performance benchmark. https:\/\/launchpad.net\/sysbench\/.  Sysbench: a system performance benchmark. https:\/\/launchpad.net\/sysbench\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Welcome to the httperf homepage. http:\/\/www.hpl.hp.com\/research\/linux\/httperf\/.  Welcome to the httperf homepage. http:\/\/www.hpl.hp.com\/research\/linux\/httperf\/."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Conference on Hot Topics in Cloud Computing","author":"Ahn J.","year":"2012","unstructured":"J. Ahn , C. Kim , J. Han , Y.-R. Choi , and J. Huh . Dynamic virtual machine scheduling in clouds for architectural shared resources . In USENIX Conference on Hot Topics in Cloud Computing , 2012 . J. Ahn, C. Kim, J. Han, Y.-R. Choi, and J. Huh. Dynamic virtual machine scheduling in clouds for architectural shared resources. In USENIX Conference on Hot Topics in Cloud Computing, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2013.28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345473"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451125"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736058"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/774861.774905"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844481"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2479942.2479948"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.55"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symp.","author":"Kim T.","year":"2012","unstructured":"T. Kim , M. Peinado , and G. Mainar-Ruiz . Stealthmem: System-level protection against cache-based side channel attacks in the cloud . In USENIX Security Symp. , 2012 . T. Kim, M. Peinado, and G. Mainar-Ruiz. Stealthmem: System-level protection against cache-based side channel attacks in the cloud. In USENIX Security Symp., 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866849"},{"key":"e_1_3_2_1_26_1","volume-title":"The Kolmogorov-Smirnov test for goodness of fit. Journal of the American statistical Association","author":"Massey F. J.","year":"1951","unstructured":"F. J. Massey Jr . The Kolmogorov-Smirnov test for goodness of fit. Journal of the American statistical Association , 1951 . F. J. Massey Jr. The Kolmogorov-Smirnov test for goodness of fit. Journal of the American statistical Association, 1951."},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symp.","author":"Moscibroda T.","year":"2007","unstructured":"T. Moscibroda and O. Mutlu . Memory performance attacks: Denial of memory service in multi-core systems . In USENIX Security Symp. , 2007 . T. Moscibroda and O. Mutlu. Memory performance attacks: Denial of memory service in multi-core systems. In USENIX Security Symp., 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155664"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Conf. on Annual Technical Conference","author":"Novakovi\u0107 D.","year":"2013","unstructured":"D. Novakovi\u0107 , N. Vasi\u0107 , S. Novakovi\u0107 , D. Kosti\u0107 , and R. Bianchini . Deepdive: Transparently identifying and managing performance interference in virtualized environments . In USENIX Conf. on Annual Technical Conference , 2013 . D. Novakovi\u0107, N. Vasi\u0107, S. Novakovi\u0107, D. Kosti\u0107, and R. Bianchini. Deepdive: Transparently identifying and managing performance interference in virtualized environments. In USENIX Conf. on Annual Technical Conference, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2011.31"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security Symp.","author":"Varadarajan V.","year":"2015","unstructured":"V. Varadarajan , Y. Zhang , T. Ristenpart , and M. Swift . A placement vulnerability study in multi-tenant public clouds . In USENIX Security Symp. , 2015 . V. Varadarajan, Y. Zhang, T. Ristenpart, and M. Swift. A placement vulnerability study in multi-tenant public clouds. In USENIX Security Symp., 2015."},{"key":"e_1_3_2_1_34_1","volume-title":"Workshop on Chip Multiprocessor Memory Systems and Interconnects","author":"Woo D. H.","year":"2007","unstructured":"D. H. Woo and H.-H. S. Lee . Analyzing performance vulnerability due to resource denial-of-service attack on chip multiprocessors . In Workshop on Chip Multiprocessor Memory Systems and Interconnects , 2007 . D. H. Woo and H.-H. S. Lee. Analyzing performance vulnerability due to resource denial-of-service attack on chip multiprocessors. In Workshop on Chip Multiprocessor Memory Systems and Interconnects, 2007."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security Symp.","author":"Wu Z.","year":"2012","unstructured":"Z. Wu , Z. Xu , and H. Wang . Whispers in the hyper-space: High-speed covert channel attacks in the cloud . In USENIX Security Symp. , 2012 . Z. Wu, Z. Xu, and H. Wang. Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In USENIX Security Symp., 2012."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symp.","author":"Xu Z.","year":"2015","unstructured":"Z. Xu , H. Wang , and Z. Wu . A measurement study on co-residence threat inside the cloud . In USENIX Security Symp. , 2015 . Z. Xu, H. Wang, and Z. Wu. A measurement study on co-residence threat inside the cloud. In USENIX Security Symp., 2015."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485974"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750422"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Annual Technical Conference","author":"Zhang X.","year":"2009","unstructured":"X. Zhang , S. Dwarkadas , and K. Shen . Hardware execution throttling for multi-core resource management . In USENIX Annual Technical Conference , 2009 . X. Zhang, S. Dwarkadas, and K. Shen. Hardware execution throttling for multi-core resource management. In USENIX Annual Technical Conference, 2009."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465388"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.53"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2011.24"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736036"}],"event":{"name":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","location":"Abu Dhabi United Arab Emirates","acronym":"ASIA CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3052978","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3052973.3052978","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3052973.3052978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:57Z","timestamp":1750217817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3052978"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":46,"alternative-id":["10.1145\/3052973.3052978","10.1145\/3052973"],"URL":"https:\/\/doi.org\/10.1145\/3052973.3052978","relation":{},"subject":[],"published":{"date-parts":[[2017,4,2]]},"assertion":[{"value":"2017-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}