{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:28Z","timestamp":1750221268992,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1566444"],"award-info":[{"award-number":["1566444"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3136064","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2617-2619","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Cache Side Channels"],"prefix":"10.1145","author":[{"given":"Yinqian","family":"Zhang","sequence":"first","affiliation":[{"name":"Ohio Sate University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_8"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77272-9_12"},{"volume-title":"7th Cryptographers' track at the RSA conference on Topics in Cryptology.","author":"Acii\u00e7mez Onur","key":"e_1_3_2_2_4_1","unstructured":"Onur Acii\u00e7mez, \u00c7etin Kaya Ko\u00e7, and Jean-Pierre Seifert. 2007. Predicting secret keys via branch prediction. In 7th Cryptographers' track at the RSA conference on Topics in Cryptology."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866854"},{"key":"e_1_3_2_2_6_1","volume-title":"Smart, and Yuval Yarom","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. 2014. \"Ooh Aah... Just a Little Bit\": A small amount of side channel can go a long way. In Cryptology ePrint Archive."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_2_8_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies.","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23264"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"e_1_3_2_2_13_1","volume-title":"26th USENIX Security Symposium. USENIX Association.","author":"Disselkoen Craig","year":"2017","unstructured":"Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen. 2017. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. In 26th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_2_15_1","volume-title":"22st USENIX Security Symposium.","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev, Dominik Feld, Boris K\u00f6pf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A tool for the static analysis of cache side channels. In 22st USENIX Security Symposium."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_2_17_1","volume-title":"AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. In 26th USENIX Security Symposium.","author":"Green Marc","year":"2017","unstructured":"Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, and Thomas Eisenbarth. 2017. AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. In 26th USENIX Security Symposium."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241208"},{"volume-title":"A Fast and Stealthy Cache Attack","author":"Gruss Daniel","key":"e_1_3_2_2_19_1","unstructured":"Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack. Springer International Publishing."},{"key":"e_1_3_2_2_20_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches. In 24th USENIX Conference on Security Symposium. USENIX Association.","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches. In 24th USENIX Conference on Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_2_22_1","volume-title":"High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference. USENIX Association.","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference. USENIX Association."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_2_24_1","unstructured":"Mehmet Sinan Inci Berk Gulmezoglu Gorka Irazoqui Thomas Eisenbarth and Berk Sunar. 2015. Seriously get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. Cryptology ePrint Archive. (2015)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062313"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897962"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-008-9018-y"},{"volume-title":"21st USENIX Security Symposium.","author":"Kim T.","key":"e_1_3_2_2_29_1","unstructured":"T. Kim, M. Peinado, and G. Mainar-Ruiz. 2012. STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud. In 21st USENIX Security Symposium."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/TC.2012.78","article-title":"Architecting Against Software Cache-Based Side-Channel Attacks","volume":"62","author":"Kong Jingfei","year":"2013","unstructured":"Jingfei Kong, Onur Aciicmez, Jean-Pierre Seifert, and Huiyang Zhou. 2013. Architecting Against Software Cache-Based Side-Channel Attacks. IEEE Trans. Comput. 62, 7 (July 2013).","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_2_31_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium. USENIX Association.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670940"},{"key":"e_1_3_2_2_33_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium.","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"key":"e_1_3_2_2_39_1","volume-title":"8th international conference on Information Security and Cryptology.","author":"Molnar David","year":"2005","unstructured":"David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The program counter security model: automatic detection and removal of controlflow side channel attacks. In 8th international conference on Information Security and Cryptology."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74462-7_11"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"volume-title":"6th Cryptographers' track at the RSA conference on Topics in Cryptology.","author":"Osvik Dag Arne","key":"e_1_3_2_2_42_1","unstructured":"Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In 6th Cryptographers' track at the RSA conference on Topics in Cryptology."},{"key":"e_1_3_2_2_43_1","unstructured":"D. Page. 2005. Partitioned Cache Architecture as a Side-Channel Defence Mechanism. (2005). http:\/\/eprint.iacr.org\/2005\/280"},{"key":"e_1_3_2_2_44_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. In 2005 BSDCan."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655019"},{"key":"e_1_3_2_2_46_1","volume-title":"24th USENIX Security Symposium. USENIX Association.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side- Channels through Obfuscated Execution. In 24th USENIX Security Symposium. USENIX Association."},{"volume-title":"Malware Guard Extension: Using SGX to Conceal Cache Attacks","author":"Schwarz Michael","key":"e_1_3_2_2_47_1","unstructured":"Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. Springer International Publishing."},{"key":"e_1_3_2_2_48_1","volume-title":"41st International Conference on Dependable Systems and Networks Workshops.","author":"Shi Jicheng","year":"2011","unstructured":"Jicheng Shi, Xiang Song, Haibo Chen, and Binyu Zang. 2011. Limiting cachebased side-channel in multi-tenant cloud using dynamic page coloring. In 41st International Conference on Dependable Systems and Networks Workshops."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_2_50_1","volume-title":"23th USENIX Security Symposium.","author":"Varadarajan Venkatanathan","year":"2014","unstructured":"Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift. 2014. Scheduler-based Defenses against Cross-VM Side-channels. In 23th USENIX Security Symposium."},{"key":"e_1_3_2_2_51_1","volume-title":"USENIX Security Symposium.","author":"Varadarajan Venkatanathan","year":"2015","unstructured":"Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In USENIX Security Symposium."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046671"},{"key":"e_1_3_2_2_53_1","volume-title":"CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium. USENIX Association.","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium. USENIX Association."},{"volume-title":"Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In ACM Conference on Computer and Communications Security.","author":"Wang Wenhao","key":"e_1_3_2_2_54_1","unstructured":"Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter. 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_2_57_1","volume-title":"Lee","author":"Wang Zhenghong","year":"2008","unstructured":"Zhenghong Wang and Ruby B. Lee. 2008. A novel cache architecture with enhanced performance and security. In 41st annual IEEE\/ACM International Symposium on Microarchitecture."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"},{"key":"e_1_3_2_2_60_1","volume-title":"One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium.","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium."},{"key":"e_1_3_2_2_61_1","unstructured":"Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. In Cryptology ePrint Archive."},{"key":"e_1_3_2_2_62_1","volume-title":"23rd USENIX Security Symposium. USENIX Association.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052978"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978360"},{"volume-title":"IEEE Symposium on Security and Privacy.","author":"Zhang Yinqian","key":"e_1_3_2_2_66_1","unstructured":"Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. 2011. Home- Alone: Co-residency Detection in the Cloud via Side-Channel Analysis. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516741"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978324"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3136064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3136064","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3136064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3136064"}},"subtitle":["State of the Art and Research Opportunities"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":70,"alternative-id":["10.1145\/3133956.3136064","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3136064","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}