{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:10Z","timestamp":1750221190350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,24]],"date-time":"2018-06-24T00:00:00Z","timestamp":1529798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Spanish Ministry of Science and Innovation","award":["TIN2015-65316-P"],"award-info":[{"award-number":["TIN2015-65316-P"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,24]]},"DOI":"10.1145\/3195970.3196003","type":"proceedings-article","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T13:54:59Z","timestamp":1529416499000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Cache side-channel attacks and time-predictability in high-performance critical real-time systems"],"prefix":"10.1145","author":[{"given":"David","family":"Trilla","sequence":"first","affiliation":[{"name":"Universitat Polit\u00e8cnica de Catalunya and BSC"}]},{"given":"Carles","family":"Hernandez","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC)"}]},{"given":"Jaume","family":"Abella","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC)"}]},{"given":"Francisco J.","family":"Cazorla","sequence":"additional","affiliation":[{"name":"BSC and IIIA-CSIC"}]}],"member":"320","published-online":{"date-parts":[[2018,6,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"J. Abella et al. 2015. WCET Analysis Methods: Pitfalls and Challenges on their Trustworthiness. In SIES.  J. Abella et al. 2015. WCET Analysis Methods: Pitfalls and Challenges on their Trustworthiness. In SIES .","key":"e_1_3_2_1_1_1","DOI":"10.1109\/SIES.2015.7185039"},{"unstructured":"O. Aciicmez et al. 2011. Method and system for securing instruction caches using substantially random instruction mapping scheme. (Nov. 8 2011). http:\/\/www.google.tl\/patents\/US8055848 US Patent 8 055 848.  O. Aciicmez et al. 2011. Method and system for securing instruction caches using substantially random instruction mapping scheme. (Nov. 8 2011). http:\/\/www.google.tl\/patents\/US8055848 US Patent 8 055 848.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/DSD.2015.26"},{"doi-asserted-by":"crossref","unstructured":"V. Bene al. 1964. Optimal Rearrangeable Multistage Connecting Networks. In Bell System Technical Journal.  V. Bene al. 1964. Optimal Rearrangeable Multistage Connecting Networks. In Bell System Technical Journal .","key":"e_1_3_2_1_4_1","DOI":"10.1002\/j.1538-7305.1964.tb04103.x"},{"unstructured":"ARM. 2001. ARM920T Technical Reference Manual.  ARM. 2001. ARM920T Technical Reference Manual .","key":"e_1_3_2_1_5_1"},{"unstructured":"J. Bernstein. 200","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/11894063_16"},{"doi-asserted-by":"crossref","unstructured":"G.E.P. Box and D.A. Pierce. 1970. Distribution of Residual Autocorrelations in Autoregressive-Integrated Moving Average Time Series Models. J. Amer. Statist. Assoc. (1970).  G.E.P. Box and D.A. Pierce. 1970. Distribution of Residual Autocorrelations in Autoregressive-Integrated Moving Average Time Series Models. J. Amer. Statist. Assoc. (1970).","key":"e_1_3_2_1_9_1","DOI":"10.1080\/01621459.1970.10481180"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ECRTS.2012.31"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2086696.2086714"},{"unstructured":"Qian Ge et al. 2017. A Survey of Microarchitectural Timing Attacks and Counter-measures on Contemporary Hardware. In Journal of Cryptographic Engineering.  Qian Ge et al. 2017. A Survey of Microarchitectural Timing Attacks and Counter-measures on Contemporary Hardware. In Journal of Cryptographic Engineering .","key":"e_1_3_2_1_12_1"},{"unstructured":"W. Feller. 1996. An introduction to Probability Theory and Its Applications.  W. Feller. 1996. An introduction to Probability Theory and Its Applications .","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"crossref","unstructured":"M. Fern\u00e1ndez et al. 2017. Probabilistic timing analysis on time-randomized platforms for the space domain. In DATE.   M. Fern\u00e1ndez et al. 2017. Probabilistic timing analysis on time-randomized platforms for the space domain. In DATE .","key":"e_1_3_2_1_14_1","DOI":"10.23919\/DATE.2017.7927087"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2897937.2898076"},{"doi-asserted-by":"crossref","unstructured":"L. Kosmidis et al. 2013. A Cache Design for Probabilistically Analysable Real-time Systems. In DATE.   L. Kosmidis et al. 2013. A Cache Design for Probabilistically Analysable Real-time Systems. In DATE .","key":"e_1_3_2_1_16_1","DOI":"10.7873\/DATE.2013.116"},{"key":"e_1_3_2_1_17_1","volume-title":"Measurement-Based Timing Analysis of the AURIX Caches. In WCET Workshop.","author":"Kosmidis","year":"2016","unstructured":"L. Kosmidis et al. 2016 . Measurement-Based Timing Analysis of the AURIX Caches. In WCET Workshop. L. Kosmidis et al. 2016. Measurement-Based Timing Analysis of the AURIX Caches. In WCET Workshop."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/MICRO.2014.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/RTAS.2013.6531084"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1555754.1555764"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2593069.2593235"},{"key":"e_1_3_2_1_22_1","first-page":"2003","volume":"200","author":"So C","unstructured":"So C Lib. 200 3-2012. -. ( 2003 - 2012 ). http:\/\/www.soclib.fr\/trac\/dev. SoCLib. 2003-2012. -. (2003-2012). http:\/\/www.soclib.fr\/trac\/dev.","journal-title":"Lib."},{"unstructured":"J. Szefer. 201","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"crossref","unstructured":"D. Trilla et al. 2016. Resilient Random Modulo Cache Memories for Probabilistically-Analyzable Real-Time Systems. In IOLTS.  D. Trilla et al. 2016. Resilient Random Modulo Cache Memories for Probabilistically-Analyzable Real-Time Systems. In IOLTS .","key":"e_1_3_2_1_24_1","DOI":"10.1109\/IOLTS.2016.7604666"},{"doi-asserted-by":"crossref","unstructured":"Y. Tsunoo et al. 2003. Cryptoanalysis of DES implemented on computers with cache. In CHES.  Y. Tsunoo et al. 2003. Cryptoanalysis of DES implemented on computers with cache. In CHES .","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-3-540-45238-6_6"},{"unstructured":"http:\/\/www.gaisler.com\/index.php\/products\/processors\/leon3. {n. d.}. Leon3 Processor. Arerofiex Gaisler.  http:\/\/www.gaisler.com\/index.php\/products\/processors\/leon3. {n. d.}. Leon3 Processor. Arerofiex Gaisler.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/1250662.1250723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/MICRO.2008.4771781"},{"unstructured":"F. Wartel et al. 2013. Timing Analysis of an Avionics Case Study on Complex Hardware\/Software Platforms. In SIES.   F. Wartel et al. 2013. Timing Analysis of an Avionics Case Study on Complex Hardware\/Software Platforms. In SIES .","key":"e_1_3_2_1_29_1"}],"event":{"sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE Council on Electronic Design Automation (CEDA)","SIGBED ACM Special Interest Group on Embedded Systems"],"acronym":"DAC '18","name":"DAC '18: The 55th Annual Design Automation Conference 2018","location":"San Francisco California"},"container-title":["Proceedings of the 55th Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195970.3196003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195970.3196003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:12Z","timestamp":1750210752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195970.3196003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,24]]},"references-count":28,"alternative-id":["10.1145\/3195970.3196003","10.1145\/3195970"],"URL":"https:\/\/doi.org\/10.1145\/3195970.3196003","relation":{},"subject":[],"published":{"date-parts":[[2018,6,24]]},"assertion":[{"value":"2018-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}