{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:57:55Z","timestamp":1755838675511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618837"],"award-info":[{"award-number":["CNS-1618837"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176316","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["MASCAT"],"prefix":"10.1145","author":[{"given":"Gorka","family":"Irazoqui","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute &amp; Nagravision Iberica, Madrid, Spain"}]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute &amp; Nagravision Iberica, Madrid, Spain"}]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Phoronix Test Suite Tests. https:\/\/openbenchmarking.org\/tests\/pts.  Phoronix Test Suite Tests. https:\/\/openbenchmarking.org\/tests\/pts."},{"key":"e_1_3_2_1_2_1","unstructured":"Ubuntu Xenial Universe Repository. http:\/\/archive.ubuntu.com\/ubuntu\/ubuntu\/dists\/xenial\/universe\/binary-amd64\/.  Ubuntu Xenial Universe Repository. http:\/\/archive.ubuntu.com\/ubuntu\/ubuntu\/dists\/xenial\/universe\/binary-amd64\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Google Adds Manual Review to Android App Submission Process. 2014.  Google Adds Manual Review to Android App Submission Process. 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17--20, 2010. Proceedings","volume":"6225","author":"Aciiccmez O.","year":"2010","unstructured":"Aciiccmez , O. , Brumley , B. B. , and Grabher , P . New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems , CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17--20, 2010. Proceedings ( 2010 ), S. Mangard and F.-X. Standaert, Eds. , vol. 6225 of Lecture Notes in Computer Science, Springer, pp. 110--124. Aciiccmez, O., Brumley, B. B., and Grabher, P. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17--20, 2010. Proceedings (2010), S. Mangard and F.-X. Standaert, Eds., vol. 6225 of Lecture Notes in Computer Science, Springer, pp. 110--124."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_7_1","first-page":"53","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Almeida J. B.","year":"2016","unstructured":"Almeida , J. B. , Barbosa , M. , Barthe , G. , Dupressoir , F. , and Emmi , M . Verifying constant-time implementations . In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016 ), USENIX Association , pp. 53 -- 70 . Almeida, J. B., Barbosa, M., Barthe, G., Dupressoir, F., and Emmi, M. Verifying constant-time implementations. In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016), USENIX Association, pp. 53--70."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_5"},{"key":"e_1_3_2_1_9_1","volume-title":"Cache-timing attacks on AES","author":"Bernstein D. J.","year":"2004","unstructured":"Bernstein , D. J. Cache-timing attacks on AES , 2004 . URL : http:\/\/cr.yp.to\/papers.html#cachetiming. Bernstein, D. J. Cache-timing attacks on AES, 2004. URL: http:\/\/cr.yp.to\/papers.html#cachetiming."},{"key":"e_1_3_2_1_10_1","unstructured":"Bhattacharya S. and Mukhopadhyay D. Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis.  Bhattacharya S. and Mukhopadhyay D. Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis."},{"key":"e_1_3_2_1_11_1","volume-title":"Can't touch this: Practical and generic software-only defenses against rowhammer attacks. CoRR abs\/1611.08396","author":"Brasser F. F.","year":"2016","unstructured":"Brasser , F. F. , Davi , L. , Gens , D. , Liebchen , C. , and Sadeghi , A . Can't touch this: Practical and generic software-only defenses against rowhammer attacks. CoRR abs\/1611.08396 ( 2016 ). Brasser, F. F., Davi, L., Gens, D., Liebchen, C., and Sadeghi, A. Can't touch this: Practical and generic software-only defenses against rowhammer attacks. CoRR abs\/1611.08396 (2016)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_15_1","unstructured":"Gruss D. Maurice C. Wagner K. and Mangard S. Flush  Gruss D. Maurice C. Wagner K. and Mangard S. Flush"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_17_1","first-page":"897","volume-title":"24th USENIX Security Symposium","author":"Gruss D.","year":"2015","unstructured":"Gruss , D. , Spreitzer , R. , and Mangard , S . Cache template attacks: Automating attacks on inclusive last-level caches . In 24th USENIX Security Symposium ( 2015 ), USENIX Association , pp. 897 -- 912 . Gruss, D., Spreitzer, R., and Mangard, S. Cache template attacks: Automating attacks on inclusive last-level caches. In 24th USENIX Security Symposium (2015), USENIX Association, pp. 897--912."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053028"},{"key":"e_1_3_2_1_20_1","volume-title":"COSADE","author":".Inc.","year":"2016","unstructured":".Inc. I, M. S., G\u00fclmezoglu , B. , Eisenbarth , T. , and Sunar , B . Co-location detection on the cloud . In COSADE ( 2016 ). .Inc.I, M. S., G\u00fclmezoglu, B., Eisenbarth, T., and Sunar, B. Co-location detection on the cloud. In COSADE (2016)."},{"key":"e_1_3_2_1_21_1","volume-title":"Cache Attacks Enable Bulk Key Recovery on the Cloud","author":"Inci M. S.","year":"2016","unstructured":". Inci , M. S. , Gulmezoglu , B. , Irazoqui , G. , Eisenbarth , T. , and Sunar , B . Cache Attacks Enable Bulk Key Recovery on the Cloud . 2016 . .Inci, M. S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., and Sunar, B. Cache Attacks Enable Bulk Key Recovery on the Cloud. 2016."},{"key":"e_1_3_2_1_22_1","first-page":"368","volume-title":"Proceedings","volume":"9813","author":".Inc.","year":"2016","unstructured":".Inc. I, M. S., Gulmezoglu , B. , Irazoqui , G. , Eisenbarth , T. , and Sunar , B . Cache attacks enable bulk key recovery on the cloud. In Cryptographic Hardware and Embedded Systems--CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016 , Proceedings ( 2016 ), vol. 9813 , Springer , p. 368 . .Inc.I, M. S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., and Sunar, B. Cache attacks enable bulk key recovery on the cloud. In Cryptographic Hardware and Embedded Systems--CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016, Proceedings (2016), vol. 9813, Springer, p. 368."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991113"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_1_26_1","first-page":"299","volume-title":"Cross-VM Attack on AES. In RAID","author":"Irazoqui G.","year":"2014","unstructured":"Irazoqui , G. ,. Inc . I, M. S. , Eisenbarth , T. , and Sunar , B . Wait a Minute! A fast , Cross-VM Attack on AES. In RAID ( 2014 ), pp. 299 -- 319 . Irazoqui, G.,.Inc.I, M. S., Eisenbarth, T., and Sunar, B. Wait a Minute! A fast, Cross-VM Attack on AES. In RAID (2014), pp. 299--319."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714625"},{"key":"e_1_3_2_1_28_1","first-page":"189","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) (Bellevue","author":"Kim T.","year":"2012","unstructured":"Kim , T. , Peinado , M. , and Mainar-Ruiz , G. Stealthmem: System-level protection against cache-based side channel attacks in the cloud . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) (Bellevue , WA, 2012 ), USENIX , pp. 189 -- 204 . Kim, T., Peinado, M., and Mainar-Ruiz, G. Stealthmem: System-level protection against cache-based side channel attacks in the cloud. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) (Bellevue, WA, 2012), USENIX, pp. 189--204."},{"key":"e_1_3_2_1_29_1","first-page":"361","volume-title":"Proceeding of the 41st Annual International Symposium on Computer Architecuture (Piscataway, NJ, USA, 2014), ISCA '14, IEEE Press","author":"Kim Y.","unstructured":"Kim , Y. , Daly , R. , Kim , J. , Fallin , C. , Lee , J. H. , Lee , D. , Wilkerson , C. , Lai , K. , and Mutlu , O . Flipping bits in memory without accessing them: An experimental study of dram disturbance errors . In Proceeding of the 41st Annual International Symposium on Computer Architecuture (Piscataway, NJ, USA, 2014), ISCA '14, IEEE Press , pp. 361 -- 372 . Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J. H., Lee, D., Wilkerson, C., Lai, K., and Mutlu, O. Flipping bits in memory without accessing them: An experimental study of dram disturbance errors. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (Piscataway, NJ, USA, 2014), ISCA '14, IEEE Press, pp. 361--372."},{"key":"e_1_3_2_1_30_1","first-page":"18","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Kruegel C.","year":"2004","unstructured":"Kruegel , C. , Robertson , W. , Valeur , F. , and Vigna , G . Static disassembly of obfuscated binaries . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (Berkeley, CA, USA, 2004 ), SSYM'04, USENIX Association , pp. 18 -- 18 . Kruegel, C., Robertson, W., Valeur, F., and Vigna, G. Static disassembly of obfuscated binaries. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (Berkeley, CA, USA, 2004), SSYM'04, USENIX Association, pp. 18--18."},{"key":"e_1_3_2_1_31_1","unstructured":"Best 2016 antivirus. http:\/\/www.pcmag.com\/article2\/0 2817 2388652 00.asp.  Best 2016 antivirus. http:\/\/www.pcmag.com\/article2\/0 2817 2388652 00.asp."},{"key":"e_1_3_2_1_32_1","first-page":"549","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Lipp M.","year":"2016","unstructured":"Lipp , M. , Gruss , D. , Spreitzer , R. , Maurice , C. , and Mangard , S . Armageddon: Cache attacks on mobile devices . In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA, August 10--12 , 2016 . (2016), pp. 549 -- 564 . Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., and Mangard, S. Armageddon: Cache attacks on mobile devices. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. (2016), pp. 549--564."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_36_1","first-page":"565","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Pessl P.","year":"2016","unstructured":"Pessl , P. , Gruss , D. , Maurice , C. , Schwarz , M. , and Mangard , S . Drama: Exploiting dram addressing for cross-cpu attacks . In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016 ), USENIX Association , pp. 565 -- 581 . Pessl, P., Gruss, D., Maurice, C., Schwarz, M., and Mangard, S. Drama: Exploiting dram addressing for cross-cpu attacks. In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016), USENIX Association, pp. 565--581."},{"key":"e_1_3_2_1_37_1","first-page":"565","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Pessl P.","year":"2016","unstructured":"Pessl , P. , Gruss , D. , Maurice , C. , Schwarz , M. , and Mangard , S . DRAMA: exploiting DRAM addressing for cross-cpu attacks . In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA, August 10--12 , 2016 . (2016), pp. 565 -- 581 . Pessl, P., Gruss, D., Maurice, C., Schwarz, M., and Mangard, S. DRAMA: exploiting DRAM addressing for cross-cpu attacks. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. (2016), pp. 565--581."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495576"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_40_1","volume-title":"Transparent deobfuscation with ida processor module extensions","author":"Rolles R.","year":"2016","unstructured":"Rolles , R. Transparent deobfuscation with ida processor module extensions , 2016 . Rolles, R. Transparent deobfuscation with ida processor module extensions, 2016."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.187"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_43_1","first-page":"913","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Varadarajan V.","year":"2015","unstructured":"Varadarajan , V. , Zhang , Y. , Ristenpart , T. , and Swift , M . A placement vulnerability study in multi-tenant public clouds . In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015 ), USENIX Association , pp. 913 -- 928 . Varadarajan, V., Zhang, Y., Ristenpart, T., and Swift, M. A placement vulnerability study in multi-tenant public clouds. In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015), USENIX Association, pp. 913--928."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_45_1","first-page":"19","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Xiao Y.","year":"2016","unstructured":"Xiao , Y. , Zhang , X. , Zhang , Y. , and Teodorescu , R . One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation . In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016 ), USENIX Association , pp. 19 -- 35 . Xiao, Y., Zhang, X., Zhang, Y., and Teodorescu, R. One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation. In 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX, Aug. 2016), USENIX Association, pp. 19--35."},{"key":"e_1_3_2_1_46_1","first-page":"929","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Xu Z.","year":"2015","unstructured":"Xu , Z. , Wang , H. , and Wu , Z . A measurement study on co-residence threat inside the cloud . In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015 ), USENIX Association , pp. 929 -- 944 . Xu, Z., Wang, H., and Wu, Z. A measurement study on co-residence threat inside the cloud. In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015), USENIX Association, pp. 929--944."},{"key":"e_1_3_2_1_47_1","volume-title":"Mastik: A micro-architectural side-channel toolkit","author":"Yarom Y.","year":"2016","unstructured":"Yarom , Y. Mastik: A micro-architectural side-channel toolkit , 2016 . Yarom, Y. Mastik: A micro-architectural side-channel toolkit, 2016."},{"volume-title":"FLUSH","author":"Yarom Y.","key":"e_1_3_2_1_48_1","unstructured":"Yarom , Y. , and Falkner , K . FLUSH Yarom, Y., and Falkner, K. FLUSH"},{"key":"e_1_3_2_1_49_1","first-page":"719","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"RELOAD","unstructured":"RELOAD : A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In 23rd USENIX Security Symposium (USENIX Security 14) , pp. 719 -- 732 . RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX Security Symposium (USENIX Security 14), pp. 719--732."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_1"},{"key":"e_1_3_2_1_51_1","volume-title":"CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds","author":"Zhang T.","year":"2016","unstructured":"Zhang , T. , Zhang , Y. , and Lee , R. B . CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds . 2016 . Zhang, T., Zhang, Y., and Lee, R. B. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. 2016."},{"key":"e_1_3_2_1_52_1","volume-title":"Memory dos attacks in multi-tenant clouds: Severity and mitigation. CoRR abs\/1603.03404","author":"Zhang T.","year":"2016","unstructured":"Zhang , T. , Zhang , Y. , and Lee , R. B . Memory dos attacks in multi-tenant clouds: Severity and mitigation. CoRR abs\/1603.03404 ( 2016 ). Zhang, T., Zhang, Y., and Lee, R. B. Memory dos attacks in multi-tenant clouds: Severity and mitigation. CoRR abs\/1603.03404 (2016)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978324"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176316","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176316"}},"subtitle":["Preventing Microarchitectural Attacks Before Distribution"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":55,"alternative-id":["10.1145\/3176258.3176316","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176316","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}