{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:02:40Z","timestamp":1772082160288,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1422401,CNS-1619450"],"award-info":[{"award-number":["CNS-1422401,CNS-1619450"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3123939.3124538","type":"proceedings-article","created":{"date-parts":[[2017,11,20]],"date-time":"2017-11-20T14:31:12Z","timestamp":1511188272000},"page":"354-366","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Constructing and characterizing covert channels on GPGPUs"],"prefix":"10.1145","author":[{"given":"Hoda","family":"Naghibijouybari","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Khaled N.","family":"Khasawneh","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2012.6168946"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592573"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2287076.2287090"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161242"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.42"},{"key":"e_1_3_2_1_7_1","volume-title":"6th Iberian Conference on Information Systems and Technologies (CISTI'11)","author":"Detomini Renan Correa","year":"2011","unstructured":"Renan Correa Detomini , Renata Spolon Lobato , Roberta Spolon , and Marcos Antonio Cavenaghi . 2011 . Using GPU to exploit parallelism on cryptography . In 6th Iberian Conference on Information Systems and Technologies (CISTI'11) . IEEE, Chaves Portugal. http:\/\/ieeexplore.ieee.org\/document\/5974171 Renan Correa Detomini, Renata Spolon Lobato, Roberta Spolon, and Marcos Antonio Cavenaghi. 2011. Using GPU to exploit parallelism on cryptography. In 6th Iberian Conference on Information Systems and Technologies (CISTI'11). IEEE, Chaves Portugal. http:\/\/ieeexplore.ieee.org\/document\/5974171"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2013.102"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2870636"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056069"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446081"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060462"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE International Symposium on High Performance Computer Architecture (HPCA'16)","author":"Liu Fangfei","unstructured":"Fangfei Liu , Qian Ge , Yuval Yarom , Frank Mckeen , Carlos Rozas , Gernot Heiser , and Ruby B. Lee . 2016. Catalyst: Defeating last-level cache side channel attacks in cloud computing . In IEEE International Symposium on High Performance Computer Architecture (HPCA'16) . Barcelona, Spain, 406--418. Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser, and Ruby B. Lee. 2016. Catalyst: Defeating last-level cache side channel attacks in cloud computing. In IEEE International Symposium on High Performance Computer Architecture (HPCA'16). Barcelona, Spain, 406--418."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357115"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337173"},{"key":"e_1_3_2_1_21_1","volume-title":"24th USENIX Security Symposium. Washington, D.C., 865--880","author":"Masti Ramya Jayaram","year":"2015","unstructured":"Ramya Jayaram Masti , Devendra Rai , Aanjhan Ranganathan , Christian M\u00fcller , Lothar Thiele , and Srdjan Capkun . 2015 . Thermal covert channels on multi-core platforms . In 24th USENIX Security Symposium. Washington, D.C., 865--880 . https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/masti Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian M\u00fcller, Lothar Thiele, and Srdjan Capkun. 2015. Thermal covert channels on multi-core platforms. In 24th USENIX Security Symposium. Washington, D.C., 865--880. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/masti"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23294"},{"key":"e_1_3_2_1_24_1","volume-title":"GPU Computing Gems (1st. ed.)","author":"Hwu Wen","unstructured":"Wen mei Hwu . 2011. GPU Computing Gems (1st. ed.) . Elsevier . Wen mei Hwu. 2011. GPU Computing Gems (1st. ed.). Elsevier."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.40"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"NVIDIA.","year":"2017","unstructured":"NVIDIA. 2017 . GPU Cloud Computing. (2017) . Retrieved August 20, 2017 from http:\/\/www.nvidia.com\/object\/gpu-cloud-computing.html NVIDIA. 2017. GPU Cloud Computing. (2017). Retrieved August 20, 2017 from http:\/\/www.nvidia.com\/object\/gpu-cloud-computing.html"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Multi-Process Service NVIDIA.","year":"2017","unstructured":"NVIDIA. 2017. Multi-Process Service . ( 2017 ). Retrieved March 2017 from https:\/\/docs.nvidia.com\/deploy\/pdf\/CUDA_Multi_Process_Service_Overview.pdf NVIDIA. 2017. Multi-Process Service. (2017). Retrieved March 2017 from https:\/\/docs.nvidia.com\/deploy\/pdf\/CUDA_Multi_Process_Service_Overview.pdf"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","author":"NVIDIA.","year":"2017","unstructured":"NVIDIA. 2017 . The Vulkan API. (2017) . Retrieved August 20, 2017 from https:\/\/developer.nvidia.com\/Vulkan NVIDIA. 2017. The Vulkan API. (2017). Retrieved August 20, 2017 from https:\/\/developer.nvidia.com\/Vulkan"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830819"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2445337"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2014.09.011"},{"key":"e_1_3_2_1_32_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. In BSDCan.  Colin Percival. 2005. Cache missing for fun and profit. In BSDCan."},{"key":"e_1_3_2_1_33_1","article-title":"CUDA leaks: Information Leakage in GPU Architecture","volume":"15","author":"Pietro Roberto Di","year":"2016","unstructured":"Roberto Di Pietro , Flavio Lombardi , and Antonio Villani . 2016 . CUDA leaks: Information Leakage in GPU Architecture . ACM Transactions on Embedded Computing Systems (TECS) 15 , 1 (2016). Roberto Di Pietro, Flavio Lombardi, and Antonio Villani. 2016. CUDA leaks: Information Leakage in GPU Architecture. ACM Transactions on Embedded Computing Systems (TECS) 15, 1 (2016).","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1996130.1996160"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_36_1","volume-title":"41st annual international symposium on Computer architecuture (ISCA'14).","author":"Tanasic Ivan","unstructured":"Ivan Tanasic , Isaac Gelado , Javier Cabezas , Alex Ramirez , Nacho Navarro , and Mateo Valero . 2014. Enabling preemptive multiprogramming on GPUs . In 41st annual international symposium on Computer architecuture (ISCA'14). Minneapolis, Minnesota, USA , 193--204. http:\/\/dl.acm.org\/citation.cfm?id=2665702 Ivan Tanasic, Isaac Gelado, Javier Cabezas, Alex Ramirez, Nacho Navarro, and Mateo Valero. 2014. Enabling preemptive multiprogramming on GPUs. In 41st annual international symposium on Computer architecuture (ISCA'14). Minneapolis, Minnesota, USA, 193--204. http:\/\/dl.acm.org\/citation.cfm?id=2665702"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2477405"},{"key":"e_1_3_2_1_42_1","unstructured":"NVIDIA Whitepaper. 2012. VIDIA's Next Generation CUDA Compute Architecture: Kepler GK110. (2012).  NVIDIA Whitepaper. 2012. VIDIA's Next Generation CUDA Compute Architecture: Kepler GK110. (2012)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452013"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.29"},{"key":"e_1_3_2_1_45_1","volume-title":"ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay. In 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'16)","author":"Yan Mengjia","year":"2016","unstructured":"Mengjia Yan , Yasser Shalabi , and Josep Tolrrellas . 2016 . ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay. In 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'16) . IEEE, Taipei Taiwan. Mengjia Yan, Yasser Shalabi, and Josep Tolrrellas. 2016. ReplayConfusion: Detecting Cache-based Covert Channel Attacks Using Record and Replay. In 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'16). IEEE, Taipei Taiwan."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038228.3038233"}],"event":{"name":"MICRO-50: The 50th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Cambridge Massachusetts","acronym":"MICRO-50","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 50th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123939.3124538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3123939.3124538","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3123939.3124538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:31Z","timestamp":1750217431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123939.3124538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":46,"alternative-id":["10.1145\/3123939.3124538","10.1145\/3123939"],"URL":"https:\/\/doi.org\/10.1145\/3123939.3124538","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}