{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:58:00Z","timestamp":1760731080022,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196508","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"587-600","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features"],"prefix":"10.1145","author":[{"given":"Michael","family":"Schwarz","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Moritz","family":"Lipp","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[{"name":"CNRS, IRISA, Rennes, France"}]},{"given":"Thomas","family":"Schuster","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Anders","family":"Fogh","sequence":"additional","affiliation":[{"name":"G DATA Advanced Analytics, Bochum, Germany"}]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Trustzone: Integrated hardware and software security.","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves . 2004 . Trustzone: Integrated hardware and software security. (2004). Tiago Alves. 2004. Trustzone: Integrated hardware and software security. (2004)."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Limited. 2012. ARM Architecture Reference Manual. ARMv7-A and ARMv7-R edition. ARM Limited.  ARM Limited. 2012. ARM Architecture Reference Manual. ARMv7-A and ARMv7-R edition. ARM Limited."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24756-2_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Matt Bishop Michael Dilger etal 1996. Checking for race conditions in file accesses. Computing systems 2 2 (1996).  Matt Bishop Michael Dilger et al. 1996. Checking for race conditions in file accesses. Computing systems 2 2 (1996)."},{"key":"e_1_3_2_1_5_1","unstructured":"Marc Blanchou. 2013. Shattering Illusions in Lock-Free Worlds -- Compiler and Hardware behaviors in OSes and VMs. In Black Hat Briefings.  Marc Blanchou. 2013. Shattering Illusions in Lock-Free Worlds -- Compiler and Hardware behaviors in OSes and VMs. In Black Hat Briefings."},{"key":"e_1_3_2_1_6_1","unstructured":"Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT.   Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.10"},{"key":"e_1_3_2_1_9_1","volume-title":"CRASHME: Random input testing.","author":"Carrette George J","year":"1996","unstructured":"George J Carrette . 1996 . CRASHME: Random input testing. (1996). George J Carrette. 1996. CRASHME: Random input testing. (1996)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_11_1","unstructured":"ANSI Technical Committee ISO\/IEC JTC 1 Working Group etal 1999. Rationale for international standard Programming languages - C. (1999).  ANSI Technical Committee ISO\/IEC JTC 1 Working Group et al. 1999. Rationale for international standard Programming languages - C. (1999)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843865"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium.","author":"Cowan Crispin","year":"2001","unstructured":"Crispin Cowan , Steve Beattie , Chris Wright , and Greg Kroah-Hartman . 2001 . RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities .. In USENIX Security Symposium. Crispin Cowan, Steve Beattie, Chris Wright, and Greg Kroah-Hartman. 2001. RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_14_1","unstructured":"M Eddington. 2008. Peach fuzzer. (2008).  M Eddington. 2008. Peach fuzzer. (2008)."},{"key":"e_1_3_2_1_15_1","unstructured":"John Erickson Madanlal Musuvathi Sebastian Burckhardt and Kirk Olynyk. 2010. Effective Data-race Detection for the Kernel. In OSDI.   John Erickson Madanlal Musuvathi Sebastian Burckhardt and Kirk Olynyk. 2010. Effective Data-race Detection for the Kernel. In OSDI."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531542.1531578"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1839676.1839699"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267102.1267108"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.116"},{"key":"e_1_3_2_1_21_1","volume-title":"A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering","author":"Ge Qian","year":"2016","unstructured":"Qian Ge , Yuval Yarom , David Cock , and Gernot Heiser . 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering ( 2016 ). Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering (2016)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1292414.1292416"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375607"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.70"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Johannes G\u00f6tzfried Moritz Eckert Sebastian Schinzel and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX. In EuroSec.  Johannes G\u00f6tzfried Moritz Eckert Sebastian Schinzel and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX. In EuroSec.","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium.","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Felix Schuster , Olya Ohrimenko , Istvan Haller , Julian Lettner , and Manuel Costa . 2017 . Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory . In USENIX Security Symposium. Daniel Gruss, Felix Schuster, Olya Ohrimenko, Istvan Haller, Julian Lettner, and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. In USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Security Symposium.","author":"Haller Istvan","year":"2013","unstructured":"Istvan Haller , Asia Slowinska , Matthias Neugschwandtner , and Herbert Bos . 2013 . Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations .. In USENIX Security Symposium. Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855056"},{"key":"e_1_3_2_1_34_1","unstructured":"Intel. 2012. Intel Architecture Instruction Set Extensions Programming Reference. (2012).  Intel. 2012. Intel Architecture Instruction Set Extensions Programming Reference. (2012)."},{"key":"e_1_3_2_1_35_1","unstructured":"Intel. 2017. Intel 64 and IA-32 Architectures Optimization Reference Manual. (2017).  Intel. 2017. Intel 64 and IA-32 Architectures Optimization Reference Manual. (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2010.16"},{"key":"e_1_3_2_1_37_1","volume-title":"13th Ottawa Linux Symposium.","author":"Jones Dave","year":"2011","unstructured":"Dave Jones . 2011 . Trinity: A system call fuzzer . In 13th Ottawa Linux Symposium. Dave Jones. 2011. Trinity: A system call fuzzer. In 13th Ottawa Linux Symposium."},{"key":"e_1_3_2_1_38_1","unstructured":"Mateusz Jurczyk Gynvael Coldwind etal 2013. Identifying and exploiting windows kernel race conditions via memory access patterns. (2013).  Mateusz Jurczyk Gynvael Coldwind et al. 2013. Identifying and exploiting windows kernel race conditions via memory access patterns. (2013)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786844"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/829522.830926"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901339"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0068-2"},{"key":"e_1_3_2_1_43_1","unstructured":"Linaro. 2016. OP-TEE: Open Portable Trusted Execution Environment. (2016). https:\/\/www.op-tee.org\/  Linaro. 2016. OP-TEE: Open Portable Trusted Execution Environment. (2016). https:\/\/www.op-tee.org\/"},{"key":"e_1_3_2_1_44_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium.","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp , Daniel Gruss , Raphael Spreitzer , Cl\u00e9mentine Maurice , and Stefan Mangard . 2016 . ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium. Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835951"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831730"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"volume-title":"Fuzzing wi-fi drivers to locate security vulnerabilities","author":"Mendon\u00e7a Manuel","key":"e_1_3_2_1_48_1","unstructured":"Manuel Mendon\u00e7a and Nuno Neves . 2008. Fuzzing wi-fi drivers to locate security vulnerabilities . In IEEE EDCC. Manuel Mendon\u00e7a and Nuno Neves. 2008. Fuzzing wi-fi drivers to locate security vulnerabilities. In IEEE EDCC."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145735.1145743"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_51_1","volume-title":"Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl.","author":"Miller Barton P","year":"1995","unstructured":"Barton P Miller , David Koski , Cjin Pheow Lee , Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. 1995 . Fuzz revisited: A reexamination of the reliability of UNIX utilities and services. Technical Report. University of Wisconsin . Barton P Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. 1995. Fuzz revisited: A reexamination of the reliability of UNIX utilities and services. Technical Report. University of Wisconsin."},{"key":"e_1_3_2_1_52_1","unstructured":"MITRE. 2017. CWE-365: Race Condition in Switch. (2017). https:\/\/cwe.mitre. org\/data\/definitions\/365.html  MITRE. 2017. CWE-365: Race Condition in Switch. (2017). https:\/\/cwe.mitre. org\/data\/definitions\/365.html"},{"key":"e_1_3_2_1_53_1","volume-title":"CacheZoom: How SGX Amplifies The Power of Cache Attacks. arXiv:1703.06986","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi , Gorka Irazoqui , and Thomas Eisenbarth . 2017. CacheZoom: How SGX Amplifies The Power of Cache Attacks. arXiv:1703.06986 ( 2017 ). Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies The Power of Cache Attacks. arXiv:1703.06986 (2017)."},{"key":"e_1_3_2_1_54_1","volume-title":"Racehound: Data race detector for Linux kernel modules.","author":"Komarov Nikita","year":"2015","unstructured":"Nikita Komarov . 2015 . Racehound: Data race detector for Linux kernel modules. (2015). https:\/\/github.com\/winnukem\/racehound Nikita Komarov. 2015. Racehound: Data race detector for Linux kernel modules. (2015). https:\/\/github.com\/winnukem\/racehound"},{"key":"e_1_3_2_1_55_1","unstructured":"William D Norcott and Don Capps. 2016. IOzone filesystem benchmark. (2016). http:\/\/www.iozone.org\/  William D Norcott and Don Capps. 2016. IOzone filesystem benchmark. (2016). http:\/\/www.iozone.org\/"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: the Case of AES. In CT-RSA.  Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: the Case of AES. In CT-RSA.","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151052"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629591"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781529"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1228965.1228969"},{"key":"e_1_3_2_1_61_1","volume-title":"Vuzzer: Application-aware evolutionary fuzzing. In NDSS.","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat , Vivek Jain , Ashish Kumar , Lucian Cojocar , Cristiano Giuffrida , and Herbert Bos . 2017 . Vuzzer: Application-aware evolutionary fuzzing. In NDSS. Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. Vuzzer: Application-aware evolutionary fuzzing. In NDSS."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.39"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Samuel Weiser Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA.  Michael Schwarz Samuel Weiser Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA.","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_65_1","unstructured":"Fermin J Serna. 2008. MS08-061 : The case of the kernel mode double-fetch. (2008). https:\/\/blogs.technet.microsoft.com\/srd\/2008\/10\/14\/ ms08-061-the-case-of-the-kernel-mode-double-fetch\/  Fermin J Serna. 2008. MS08-061 : The case of the kernel mode double-fetch. (2008). https:\/\/blogs.technet.microsoft.com\/srd\/2008\/10\/14\/ ms08-061-the-case-of-the-kernel-mode-double-fetch\/"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs. In NDSS.  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs. In NDSS.","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_67_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS. Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066758"},{"key":"e_1_3_2_1_69_1","unstructured":"Dmitry Vyukov. 2016. syzkaller - linux syscall fuzzer. (2016). https:\/\/github.com\/ google\/syzkaller  Dmitry Vyukov. 2016. syzkaller - linux syscall fuzzer. (2016). https:\/\/github.com\/ google\/syzkaller"},{"key":"e_1_3_2_1_70_1","volume-title":"USENIX Security Symposium.","author":"Wang Pengfei","year":"2017","unstructured":"Pengfei Wang and Jens Krinke . 2017 . How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel . In USENIX Security Symposium. Pengfei Wang and Jens Krinke. 2017. How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. In USENIX Security Symposium."},{"key":"e_1_3_2_1_72_1","unstructured":"Jinpeng Wei and Calton Pu. 2005. TOCTTOU Vulnerabilities in UNIX-style File Systems: An Anatomical Study. In FAST.   Jinpeng Wei and Calton Pu. 2005. TOCTTOU Vulnerabilities in UNIX-style File Systems: An Anatomical Study. In FAST."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Nico Weichbrodt Anil Kurmus Peter Pietzuch and R\u00fcdiger Kapitza. 2016. AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves. In ESORICS.  Nico Weichbrodt Anil Kurmus Peter Pietzuch and R\u00fcdiger Kapitza. 2016. AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves. In ESORICS.","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_74_1","volume-title":"Acculock: Accurate and Efficient Detection of Data Races. In CGO.","author":"Xie Xinwei","year":"2011","unstructured":"Xinwei Xie and Jingling Xue . 2011 . Acculock: Accurate and Efficient Detection of Data Races. In CGO. Xinwei Xie and Jingling Xue. 2011. Acculock: Accurate and Efficient Detection of Data Races. In CGO."},{"key":"e_1_3_2_1_75_1","unstructured":"Meng Xu Chenxiong Qian Kangjie Lu Michael Backes and Taesoo Kim. 2018. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. In S&P.  Meng Xu Chenxiong Qian Kangjie Lu Michael Backes and Taesoo Kim. 2018. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. In S&P."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_77_1","volume-title":"USENIX Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack . In USENIX Security Symposium. Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503232"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_80_1","volume-title":"Uppsala Universitet.","author":"Zacharopoulos Georgios","year":"2015","unstructured":"Georgios Zacharopoulos . 2015. Employing Hardware Transactional Memory in Prefetching for Energy Efficiency. Examensarbete , Uppsala Universitet. ( 2015 ). Georgios Zacharopoulos. 2015. Employing Hardware Transactional Memory in Prefetching for Energy Efficiency. Examensarbete, Uppsala Universitet. (2015)."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":79,"alternative-id":["10.1145\/3196494.3196508","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196508","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}