{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:37:52Z","timestamp":1772642272395,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T00:00:00Z","timestamp":1561161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,22]]},"DOI":"10.1145\/3307650.3322246","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"360-371","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":97,"title":["New attacks and defense for encrypted-address cache"],"prefix":"10.1145","author":[{"given":"Moinuddin K.","family":"Qureshi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"rep","author":"Bernstein D. J.","year":"2005","unstructured":"D. J. Bernstein, \"Cache-timing attacks on AES,\" tech. rep., 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_1_4_1","volume-title":"Oct","author":"Kiriansky V.","year":"2018","unstructured":"V. Kiriansky, I. Lebedev, S. Amarasinghe, S. Devadas, and J. Emer, \"DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors,\" in 51st Annual IEEE\/ACM International Symposium on Microarchitecture, Oct 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_3_2_1_6_1","volume-title":"Oct","author":"Qureshi M.","year":"2018","unstructured":"M. Qureshi, \"CEASER: Mitigating Conflit-Based Cache Attacks via Encrypted-Address and Remapping,\" in 51st Annual IEEE\/ACM International Symposium on Microarchitecture, Oct 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815971"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"A. Seznec \"A case for two-way skewed-associative caches \" in Annual International Symposium on Computer Architecture (ISCA) 1993. 10.1145\/165123.165152","DOI":"10.1145\/165123.165152"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.41"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2009.30"},{"key":"e_1_3_2_1_12_1","first-page":"328","volume-title":"Accord: Enabling associativity for gigascale dram caches by coordinating way-install and way-prediction,\" in 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)","author":"Young V.","year":"2018","unstructured":"V. Young, C. Chou, A. Jaleel, and M. Qureshi, \"Accord: Enabling associativity for gigascale dram caches by coordinating way-install and way-prediction,\" in 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA), pp. 328--339, 2018."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_14_1","unstructured":"C. Percival \"Cache missing for fun and profit \" in The Technical BSD Conference 2005."},{"key":"e_1_3_2_1_15_1","unstructured":"How Much Will It Cost To Sniff Out The Spies? (Riddler Nation at FiveThirtyEight.com on Oct 5 2018). https:\/\/fivethirtyeight.com\/features\/how-much-will-it-cost-to-sniff-out-the-spies\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250709"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155671"},{"key":"e_1_3_2_1_18_1","first-page":"2017","article-title":"Ship++: Enhancing signature-based hit predictor for improved cache performance,\" in The 2nd Cache Replacement Championship (CRC-2 Workshop","author":"Young V.","year":"2017","unstructured":"V. Young, C.-C. Chou, A. Jaleel, and M. Qureshi, \"Ship++: Enhancing signature-based hit predictor for improved cache performance,\" in The 2nd Cache Replacement Championship (CRC-2 Workshop in ISCA 2017), 2017.","journal-title":"ISCA"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.24"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.17"},{"key":"e_1_3_2_1_21_1","first-page":"03619","article-title":"The GAP benchmark suite","volume":"1508","author":"Beamer S.","year":"2015","unstructured":"S. Beamer, K. Asanovic, and D. A. Patterson, \"The GAP benchmark suite,\" CoRR, vol. abs\/1508.03619, 2015.","journal-title":"CoRR"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/635506.605403"},{"key":"e_1_3_2_1_23_1","first-page":"695","volume-title":"Theory and practice of finding eviction sets,\" in 2019 2019 IEEE Symposium on Security and Privacy (SP)","author":"Vila P.","year":"2019","unstructured":"P. Vila, B. Kopf, and J. F. Morales, \"Theory and practice of finding eviction sets,\" in 2019 2019 IEEE Symposium on Security and Privacy (SP), pp. 695--710, may 2019."},{"key":"e_1_3_2_1_24_1","volume-title":"CATalyst: Defeating last-level cache side channel attacks in cloud computing,\" in IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Liu F.","year":"2016","unstructured":"F. Liu, Q. Ge, Y. Yarom, F. Mckeen, C. Rozas, G. Heiser, and R. B. Lee, \"CATalyst: Defeating last-level cache side channel attacks in cloud computing,\" in IEEE International Symposium on High Performance Computer Architecture (HPCA), 2016."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362804"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124546"},{"key":"e_1_3_2_1_27_1","volume-title":"Attack directories, not caches: Side channel attacks in a non-inclusive world,\" in IEEE Symposium on Security and Privacy (S&P)","author":"Yan M.","year":"2019","unstructured":"M. Yan, R. Sprabery, B. Gopireddy, C. Fletcher, R. Campbell, and J. Torrellas, \"Attack directories, not caches: Side channel attacks in a non-inclusive world,\" in IEEE Symposium on Security and Privacy (S&P), 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"Jan.","author":"Kocher P.","year":"2018","unstructured":"P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom, \"Spectre attacks: Exploiting speculative execution,\" ArXiv e-prints, Jan. 2018."},{"key":"e_1_3_2_1_29_1","volume-title":"Jan.","author":"Lipp M.","year":"2018","unstructured":"M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg, \"Meltdown,\" ArXiv e-prints, Jan. 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"e_1_3_2_1_31_1","volume-title":"Oct","author":"Yan M.","year":"2018","unstructured":"M. Yan, J. Choi, D. Skarlatos, A. Morrison, C. W. Fletcher, and J. Torrellas, \"Invisispec: Making speculative execution invisible in the cache hierarchy,\" in 51st Annual IEEE\/ACM International Symposium on Microarchitecture, Oct 2018."}],"event":{"name":"ISCA '19: The 46th Annual International Symposium on Computer Architecture","location":"Phoenix Arizona","acronym":"ISCA '19","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 46th International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307650.3322246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:06Z","timestamp":1750204446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307650.3322246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,22]]},"references-count":31,"alternative-id":["10.1145\/3307650.3322246","10.1145\/3307650"],"URL":"https:\/\/doi.org\/10.1145\/3307650.3322246","relation":{},"subject":[],"published":{"date-parts":[[2019,6,22]]},"assertion":[{"value":"2019-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}