{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T04:10:43Z","timestamp":1775707843888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARM Ltd"},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1563753"],"award-info":[{"award-number":["CCF-1563753"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007161","name":"Boston University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3339809","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"167-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Page Cache Attacks"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Gruss","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Erik","family":"Kraft","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Trishita","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Ari","family":"Trachtenberg","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Jason","family":"Hennessey","sequence":"additional","affiliation":[{"name":"NetApp, Sunnyvale, CA, USA"}]},{"given":"Alex","family":"Ionescu","sequence":"additional","affiliation":[{"name":"CrowdStrike, Sunnyvale, CA, USA"}]},{"given":"Anders","family":"Fogh","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"USENIX Security Symposium.","author":"Argyros George","year":"2012","unstructured":"George Argyros and Aggelos Kiayias . 2012 . I Forgot Your Password: Randomness Attacks Against PHP Applications .. In USENIX Security Symposium. George Argyros and Aggelos Kiayias. 2012. I Forgot Your Password: Randomness Attacks Against PHP Applications.. In USENIX Security Symposium."},{"key":"e_1_3_2_2_2_1","volume-title":"Gross","author":"Barresi Antonio","year":"2015","unstructured":"Antonio Barresi , Kaveh Razavi , Mathias Payer , and Thomas R . Gross . 2015 . CAIN : Silently Breaking ASLR in the Cloud. In WOOT. Antonio Barresi, Kaveh Razavi, Mathias Payer, and Thomas R. Gross. 2015. CAIN: Silently Breaking ASLR in the Cloud. In WOOT."},{"key":"e_1_3_2_2_3_1","unstructured":"Daniel J. Bernstein. 2004. Cache-Timing Attacks on AES. http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf  Daniel J. Bernstein. 2004. Cache-Timing Attacks on AES. http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Antonio Bianchi Jacopo Corbetta Luca Invernizzi Yanick Fratantonio Christopher Kruegel and Giovanni Vigna. 2015. What the app is that? deception and countermeasures in the android user interface. In S&P.  Antonio Bianchi Jacopo Corbetta Luca Invernizzi Yanick Fratantonio Christopher Kruegel and Giovanni Vigna. 2015. What the app is that? deception and countermeasures in the android user interface. In S&P.","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Andrew Bortz and Dan Boneh. 2007. Exposing private information by timing web applications. In WWW.  Andrew Bortz and Dan Boneh. 2007. Exposing private information by timing web applications. In WWW.","DOI":"10.1145\/1242572.1242656"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In S&P .  Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In S&P .","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460628"},{"key":"e_1_3_2_2_8_1","unstructured":"Luigi Bruno. 2013. What page replacement algorithms does the windows 7 OS uses? https:\/\/social.technet.microsoft.com\/Forums\/ie\/en-US\/e61aef24--38fd-4e7e-a4c1-a50aa226818c  Luigi Bruno. 2013. What page replacement algorithms does the windows 7 OS uses? https:\/\/social.technet.microsoft.com\/Forums\/ie\/en-US\/e61aef24--38fd-4e7e-a4c1-a50aa226818c"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067627.806596"},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Security Symposium.","author":"Chen Qi Alfred","year":"2014","unstructured":"Qi Alfred Chen , Zhiyun Qian , and Zhuoqing Morley Mao . 2014 . Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks .. In USENIX Security Symposium. Qi Alfred Chen, Zhiyun Qian, and Zhuoqing Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.. In USENIX Security Symposium."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"David Cock Qian Ge Toby Murray and Gernot Heiser. 2014. The last mile: An empirical study of timing channels on seL4. In CCS.  David Cock Qian Ge Toby Murray and Gernot Heiser. 2014. The last mile: An empirical study of timing channels on seL4. In CCS.","DOI":"10.1145\/2660267.2660294"},{"key":"e_1_3_2_2_13_1","unstructured":"Jonathan Corbet. 2005. A CLOCK-Pro page replacement implementation. https:\/\/lwn.net\/Articles\/147879\/  Jonathan Corbet. 2005. A CLOCK-Pro page replacement implementation. https:\/\/lwn.net\/Articles\/147879\/"},{"key":"e_1_3_2_2_14_1","unstructured":"Jonathan Corbet. 2019 a. Defending against page-cache attacks . https:\/\/lwn.net\/Articles\/776801\/  Jonathan Corbet. 2019 a. Defending against page-cache attacks . https:\/\/lwn.net\/Articles\/776801\/"},{"key":"e_1_3_2_2_15_1","unstructured":"Jonathan Corbet. 2019 b. Fixing page-cache side channels second attempt . https:\/\/lwn.net\/Articles\/778437\/  Jonathan Corbet. 2019 b. Fixing page-cache side channels second attempt . https:\/\/lwn.net\/Articles\/778437\/"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455530"},{"key":"e_1_3_2_2_17_1","unstructured":"Doug Crowthers. 2011. Can You Get More Space Or Speed From Your SSD? https:\/\/www.tomshardware.com\/reviews\/ssd-performance-tweak 2911--4.html  Doug Crowthers. 2011. Can You Get More Space Or Speed From Your SSD? https:\/\/www.tomshardware.com\/reviews\/ssd-performance-tweak 2911--4.html"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363141"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230464"},{"key":"e_1_3_2_2_20_1","first-page":"147","article-title":"Performance Issues in Cloud Computing: KVM Hypervisor's Cache Modes Evaluation","volume":"12","author":"Djordjevic Borislav","year":"2015","unstructured":"Borislav Djordjevic , Nemanja Maek , and Valentina Timenko . 2015 . Performance Issues in Cloud Computing: KVM Hypervisor's Cache Modes Evaluation . Acta Polytechnica Hungarica , Vol. 12 , 4 (2015), 147 -- 165 . Borislav Djordjevic, Nemanja Maek, and Valentina Timenko. 2015. Performance Issues in Cloud Computing: KVM Hypervisor's Cache Modes Evaluation . Acta Polytechnica Hungarica , Vol. 12, 4 (2015), 147--165.","journal-title":"Acta Polytechnica Hungarica"},{"key":"e_1_3_2_2_21_1","volume-title":"Zend Conference.","author":"Esser Stefan","year":"2008","unstructured":"Stefan Esser . 2008 . Lesser known security problems in PHP applications . In Zend Conference. Stefan Esser. 2008. Lesser known security problems in PHP applications. In Zend Conference."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Edward W Felten and Michael A Schneider. 2000. Timing attacks on web privacy. In CCS .  Edward W Felten and Michael A Schneider. 2000. Timing attacks on web privacy. In CCS .","DOI":"10.1145\/352600.352606"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Yanick Fratantonio Chenxiong Qian Simon P Chung and Wenke Lee. 2017. Cloak and dagger: from two permissions to complete control of the UI feedback loop. In S&P.  Yanick Fratantonio Chenxiong Qian Simon P Chung and Wenke Lee. 2017. Cloak and dagger: from two permissions to complete control of the UI feedback loop. In S&P.","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_2_24_1","volume-title":"Int. CMG Conference.","author":"Friedman Mark B","year":"1999","unstructured":"Mark B Friedman . 1999 . Windows NT page replacement policies . In Int. CMG Conference. Mark B Friedman. 1999. Windows NT page replacement policies. In Int. CMG Conference."},{"key":"e_1_3_2_2_25_1","volume-title":"Understanding the Linux virtual memory manager","author":"Gorman Mel","unstructured":"Mel Gorman . 2004. Understanding the Linux virtual memory manager . Prentice Hall Upper Saddle River . Mel Gorman. 2004. Understanding the Linux virtual memory manager. Prentice Hall Upper Saddle River."},{"key":"e_1_3_2_2_26_1","volume-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium .","author":"Gras Ben","year":"2018","unstructured":"Ben Gras , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2018 . Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium . Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In NDSS.  Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In NDSS.","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss David Bidner and Stefan Mangard. 2015a. Practical Memory Deduplication Attacks in Sandboxed JavaScript. In ESORICS.  Daniel Gruss David Bidner and Stefan Mangard. 2015a. Practical Memory Deduplication Attacks in Sandboxed JavaScript. In ESORICS.","DOI":"10.1007\/978-3-319-24174-6_6"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Moritz Lipp Michael Schwarz Daniel Genkin Jonas Juffinger Sioli O'Connell Wolfgang Schoechl and Yuval Yarom. 2018. Another Flip in the Wall of Rowhammer Defenses . In S&P .  Daniel Gruss Moritz Lipp Michael Schwarz Daniel Genkin Jonas Juffinger Sioli O'Connell Wolfgang Schoechl and Yuval Yarom. 2018. Another Flip in the Wall of Rowhammer Defenses . In S&P .","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2016a. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. In DIMVA .  Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2016a. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. In DIMVA .","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_2_31_1","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016b. Flush  Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016b. Flush"},{"key":"e_1_3_2_2_32_1","unstructured":"Flush: A Fast and Stealthy Cache Attack . In DIMVA .  Flush: A Fast and Stealthy Cache Attack . In DIMVA ."},{"key":"e_1_3_2_2_33_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security Symposium .","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss , Raphael Spreitzer , and Stefan Mangard . 2015 b. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security Symposium . Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015b. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Berk Gulmezoglu Thomas Eisenbarth and Berk Sunar. 2017. Cache-based application detection in the cloud using machine learning. In AsiaCCS.  Berk Gulmezoglu Thomas Eisenbarth and Berk Sunar. 2017. Cache-based application detection in the cloud using machine learning. In AsiaCCS.","DOI":"10.1145\/3052973.3053036"},{"key":"e_1_3_2_2_35_1","unstructured":"Vidar Holen. 2017. Experiments and fun with the Linux disk cache . https:\/\/www.linuxatemyram.com\/play.html  Vidar Holen. 2017. Experiments and fun with the Linux disk cache . https:\/\/www.linuxatemyram.com\/play.html"},{"key":"e_1_3_2_2_36_1","unstructured":"Christian Horn. 2017. Do we really need swap on modern systems? https:\/\/www.redhat.com\/en\/blog\/do-we-really-need-swap-modern-systems  Christian Horn. 2017. Do we really need swap on modern systems? https:\/\/www.redhat.com\/en\/blog\/do-we-really-need-swap-modern-systems"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.24"},{"key":"e_1_3_2_2_38_1","volume-title":"CHES (LNCS)","author":"Inci Mehmet S","unstructured":"Mehmet S Inci , Berk Gulmezoglu , Gorka Irazoqui , Thomas Eisenbarth , and Berk Sunar . 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud . In CHES (LNCS) , Vol. 9813 . Springer , 368--388. Mehmet S Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar. 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud. In CHES (LNCS), Vol. 9813. Springer, 368--388."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Gorka Irazoqui Thomas Eisenbarth and Berk Sunar. 2016. Cross processor cache attacks. In AsiaCCS .  Gorka Irazoqui Thomas Eisenbarth and Berk Sunar. 2016. Cross processor cache attacks. In AsiaCCS .","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_2_40_1","volume-title":"Thomas Eisenbarth, and Berk Sunar.","author":"Irazoqui Gorka","year":"2015","unstructured":"Gorka Irazoqui , Mehmet Sinan Inci , Thomas Eisenbarth, and Berk Sunar. 2015 . Lucky 13 Strikes Back. In AsiaCCS . Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar. 2015. Lucky 13 Strikes Back. In AsiaCCS ."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Collin Jackson Andrew Bortz Dan Boneh and John C Mitchell. 2006. Protecting browser state from web privacy attacks. In WWW.  Collin Jackson Andrew Bortz Dan Boneh and John C Mitchell. 2006. Protecting browser state from web privacy attacks. In WWW.","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.103"},{"key":"e_1_3_2_2_43_1","unstructured":"Song Jiang Feng Chen and Xiaodong Zhang. 2005. CLOCK-Pro: An Effective Improvement of the CLOCK Replacement.. In USENIX ATC.  Song Jiang Feng Chen and Xiaodong Zhang. 2005. CLOCK-Pro: An Effective Improvement of the CLOCK Replacement.. In USENIX ATC."},{"key":"e_1_3_2_2_44_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In S&P .","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution. In S&P . Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In S&P ."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffe-Hellman RSA DSS and Other Systems. In CRYPTO .  Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffe-Hellman RSA DSS and Other Systems. In CRYPTO .","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_2_47_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium .","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp , Daniel Gruss , Raphael Spreitzer , Cl\u00e9mentine Maurice , and Stefan Mangard . 2016 . ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium . Moritz Lipp, Daniel Gruss, Raphael Spreitzer , Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_48_1","volume-title":"USENIX Security Symposium .","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In USENIX Security Symposium . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space . In USENIX Security Symposium ."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Cl\u00e9mentine Maurice Christoph Neumann Olivier Heen and Aur\u00e9lien Francillon. 2015. C5: Cross-Cores Cache Covert Channel. In DIMVA .  Cl\u00e9mentine Maurice Christoph Neumann Olivier Heen and Aur\u00e9lien Francillon. 2015. C5: Cross-Cores Cache Covert Channel. In DIMVA .","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"e_1_3_2_2_50_1","volume-title":"Stefan Mangard, and Kay R\u00f6mer.","author":"Maurice Cl\u00e9mentine","year":"2017","unstructured":"Cl\u00e9mentine Maurice , Manuel Weber , Michael Schwarz , Lukas Giner , Daniel Gruss , Carlo Alberto Boano , Stefan Mangard, and Kay R\u00f6mer. 2017 . Hello from the Other Side : SSH over Robust Cache Covert Channels in the Cloud. In NDSS . Cl\u00e9mentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, and Kay R\u00f6mer. 2017. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. In NDSS ."},{"key":"e_1_3_2_2_51_1","unstructured":"Microsoft. 2017. Cache and Memory Manager Improvements . https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/performance-tuning\/subsystem\/cache-memory-management\/improvements-in-windows-server  Microsoft. 2017. Cache and Memory Manager Improvements . https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/performance-tuning\/subsystem\/cache-memory-management\/improvements-in-windows-server"},{"key":"e_1_3_2_2_52_1","unstructured":"Microsoft. 2018a. Programming reference for Windows API. https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/api\/index  Microsoft. 2018a. Programming reference for Windows API. https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/api\/index"},{"key":"e_1_3_2_2_53_1","unstructured":"Microsoft. 2018b. Windows desktop applications. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa906039.aspx  Microsoft. 2018b. Windows desktop applications. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa906039.aspx"},{"key":"e_1_3_2_2_54_1","unstructured":"Microsoft. 2018c. x64 stack usage. https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/stack-usage?view=vs-2017  Microsoft. 2018c. x64 stack usage. https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/stack-usage?view=vs-2017"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"John Monaco. 2018. SoK: Keylogging Side Channels. In S&P.  John Monaco. 2018. SoK: Keylogging Side Channels. In S&P.","DOI":"10.1109\/SP.2018.00026"},{"key":"e_1_3_2_2_56_1","volume-title":"UI Redressing Attacks on Android Devices . Black Hat Abu Dhabi","author":"Niemietz Marcus","year":"2012","unstructured":"Marcus Niemietz and J\u00f6rg Schwenk . 2012. UI Redressing Attacks on Android Devices . Black Hat Abu Dhabi ( 2012 ). Marcus Niemietz and J\u00f6rg Schwenk. 2012. UI Redressing Attacks on Android Devices . Black Hat Abu Dhabi (2012)."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: the Case of AES. In CT-RSA .  Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: the Case of AES. In CT-RSA .","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_2_58_1","volume-title":"International Performance Computing and Communications Conference .","author":"Owens Rodney","year":"2011","unstructured":"Rodney Owens and Weichao Wang . 2011 . Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines . In International Performance Computing and Communications Conference . Rodney Owens and Weichao Wang. 2011. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines. In International Performance Computing and Communications Conference ."},{"key":"e_1_3_2_2_59_1","unstructured":"Mathias Payer. 2019. https:\/\/twitter.com\/gannimo\/status\/1086185299225571328  Mathias Payer. 2019. https:\/\/twitter.com\/gannimo\/status\/1086185299225571328"},{"key":"e_1_3_2_2_60_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. In BSDCan .  Colin Percival. 2005. Cache missing for fun and profit. In BSDCan ."},{"key":"e_1_3_2_2_61_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium .","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium . Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_62_1","volume-title":"USENIX Security Symposium .","author":"Razavi Kaveh","year":"2016","unstructured":"Kaveh Razavi , Ben Gras , Erik Bosman , Bart Preneel , Cristiano Giuffrida , and Herbert Bos . 2016 . Flip Feng Shui: Hammering a Needle in the Software Stack . In USENIX Security Symposium . Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. 2016. Flip Feng Shui: Hammering a Needle in the Software Stack. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_63_1","unstructured":"Red Hat. 2017. Red Hat Enterprise Linux 7 - Virtualization Tuning and Optimization Guide.  Red Hat. 2017. Red Hat Enterprise Linux 7 - Virtualization Tuning and Optimization Guide."},{"key":"e_1_3_2_2_64_1","volume-title":"Towards Discovering and Understanding Task Hijacking in Android. In USENIX Security Symposium.","author":"Ren Chuangang","year":"2015","unstructured":"Chuangang Ren , Yulong Zhang , Hui Xue , Tao Wei , and Peng Liu . 2015 . Towards Discovering and Understanding Task Hijacking in Android. In USENIX Security Symposium. Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In USENIX Security Symposium."},{"key":"e_1_3_2_2_65_1","unstructured":"Thorsten Rinne. 2018. phpMyFAQ - Open Source FAQ system for PHP and MySQL PostgreSQL and other databases. https:\/\/github.com\/thorsten\/phpMyFAQ  Thorsten Rinne. 2018. phpMyFAQ - Open Source FAQ system for PHP and MySQL PostgreSQL and other databases. https:\/\/github.com\/thorsten\/phpMyFAQ"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"Thomas Ristenpart Eran Tromer Hovav Shacham and Stefan Savage. 2009. Hey You Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS .  Thomas Ristenpart Eran Tromer Hovav Shacham and Stefan Savage. 2009. Hey You Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS .","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_2_67_1","unstructured":"Mark Russinovich. 1998. Inside Memory Management Part 2. https:\/\/www.itprotoday.com\/management-mobility\/inside-memory-management-part-2  Mark Russinovich. 1998. Inside Memory Management Part 2. https:\/\/www.itprotoday.com\/management-mobility\/inside-memory-management-part-2"},{"key":"e_1_3_2_2_68_1","unstructured":"Mark E Russinovich David A Solomon and Alex Ionescu. 2012. Windows internals .Pearson Education.  Mark E Russinovich David A Solomon and Alex Ionescu. 2012. Windows internals .Pearson Education."},{"key":"e_1_3_2_2_69_1","volume-title":"4th USENIX Conference on Offensive Technologies.","author":"Rydstedt Gustav","year":"2010","unstructured":"Gustav Rydstedt , Baptiste Gourdin , Elie Bursztein , and Dan Boneh . 2010 . Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks . In 4th USENIX Conference on Offensive Technologies. Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh. 2010. Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks. In 4th USENIX Conference on Offensive Technologies."},{"key":"e_1_3_2_2_70_1","volume-title":"Anti-Abuse and Spam Conference (CEAS).","author":"Sanchez Fernando","year":"2010","unstructured":"Fernando Sanchez , Zhenhai Duan , and Yingfei Dong . 2010 . Understanding forgery properties of spam delivery paths. In Annual Collaboration, Electronic Messaging , Anti-Abuse and Spam Conference (CEAS). Fernando Sanchez, Zhenhai Duan, and Yingfei Dong. 2010. Understanding forgery properties of spam delivery paths. In Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS)."},{"key":"e_1_3_2_2_71_1","unstructured":"Patrick Schmid. 2007. Windows Vista's SuperFetch and ReadyBoost Analyzed. https:\/\/www.tomshardware.com\/reviews\/windows-vista-superfetch-and-readyboostanalyzed 1532--2.html  Patrick Schmid. 2007. Windows Vista's SuperFetch and ReadyBoost Analyzed. https:\/\/www.tomshardware.com\/reviews\/windows-vista-superfetch-and-readyboostanalyzed 1532--2.html"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Moritz Lipp Daniel Gruss Samuel Weiser Cl\u00e9mentine Maurice Raphael Spreitzer and Stefan Mangard. 2018a. KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. In NDSS .  Michael Schwarz Moritz Lipp Daniel Gruss Samuel Weiser Cl\u00e9mentine Maurice Raphael Spreitzer and Stefan Mangard. 2018a. KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. In NDSS .","DOI":"10.14722\/ndss.2018.23027"},{"key":"e_1_3_2_2_73_1","volume-title":"NetSpectre: Read Arbitrary Memory over Network . arXiv:1807.10535","author":"Schwarz Michael","year":"2018","unstructured":"Michael Schwarz , Martin Schwarzl , Moritz Lipp , and Daniel Gruss . 2018b. NetSpectre: Read Arbitrary Memory over Network . arXiv:1807.10535 ( 2018 ). Michael Schwarz, Martin Schwarzl, Moritz Lipp, and Daniel Gruss. 2018b. NetSpectre: Read Arbitrary Memory over Network . arXiv:1807.10535 (2018)."},{"key":"e_1_3_2_2_74_1","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. In Black Hat Briefings .  Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. In Black Hat Briefings ."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"crossref","unstructured":"Hovav Shacham Matthew Page Ben Pfaff Eu-Jin Goh Nagendra Modadugu and Dan Boneh. 2004. On the effectiveness of address-space randomization. In CCS.  Hovav Shacham Matthew Page Ben Pfaff Eu-Jin Goh Nagendra Modadugu and Dan Boneh. 2004. On the effectiveness of address-space randomization. In CCS.","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_2_76_1","volume-title":"Timing Analysis of Keystrokes and Timing Attacks on SSH. In USENIX Security Symposium .","author":"Song Dawn Xiaodong","year":"2001","unstructured":"Dawn Xiaodong Song , David Wagner , and Xuqing Tian . 2001 . Timing Analysis of Keystrokes and Timing Attacks on SSH. In USENIX Security Symposium . Dawn Xiaodong Song, David Wagner, and Xuqing Tian. 2001. Timing Analysis of Keystrokes and Timing Attacks on SSH. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"crossref","unstructured":"Kuniyasu Suzaki Kengo Iijima Toshiki Yagi and Cyrille Artho. 2011. Memory Deduplication as a Threat to the Guest OS. In EuroSys .  Kuniyasu Suzaki Kengo Iijima Toshiki Yagi and Cyrille Artho. 2011. Memory Deduplication as a Threat to the Guest OS. In EuroSys .","DOI":"10.1145\/1972551.1972552"},{"key":"e_1_3_2_2_78_1","volume-title":"Best SSDs: Q2","author":"Tallis Billy","year":"2018","unstructured":"Billy Tallis . 2018. Best SSDs: Q2 2018 . https:\/\/www.anandtech.com\/show\/9799\/best-ssds Billy Tallis. 2018. Best SSDs: Q2 2018. https:\/\/www.anandtech.com\/show\/9799\/best-ssds"},{"key":"e_1_3_2_2_79_1","volume-title":"POSTER: Cashing in on the File-System Cache. In ACM SIGSAC Conference on Computer and Communications Security.","author":"Tiwari Trishita","year":"2018","unstructured":"Trishita Tiwari and Ari Trachtenberg . 2018 . POSTER: Cashing in on the File-System Cache. In ACM SIGSAC Conference on Computer and Communications Security. Trishita Tiwari and Ari Trachtenberg. 2018. POSTER: Cashing in on the File-System Cache. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"crossref","unstructured":"Tom Van Goethem Wouter Joosen and Nick Nikiforakis. 2015. The clock is still ticking: Timing attacks in the modern web. In CCS.  Tom Van Goethem Wouter Joosen and Nick Nikiforakis. 2015. The clock is still ticking: Timing attacks in the modern web. In CCS.","DOI":"10.1145\/2810103.2813632"},{"key":"e_1_3_2_2_83_1","volume-title":"Edward JM Colbert, and Paul Yu","author":"Wang Daimeng","year":"2019","unstructured":"Daimeng Wang , Ajaya Neupane , Zhiyun Qian , Nael Abu-Ghazaleh , Srikanth V Krishnamurthy , Edward JM Colbert, and Paul Yu . 2019 . Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. In NDSS. Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael Abu-Ghazaleh, Srikanth V Krishnamurthy, Edward JM Colbert, and Paul Yu. 2019. Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. In NDSS."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"crossref","unstructured":"Wenhao Wang Guoxing Chen Xiaorui Pan Yinqian Zhang XiaoFeng Wang Vincent Bindschaedler Haixu Tang and Carl A Gunter. 2017. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. In CCS .  Wenhao Wang Guoxing Chen Xiaorui Pan Yinqian Zhang XiaoFeng Wang Vincent Bindschaedler Haixu Tang and Carl A Gunter. 2017. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. In CCS .","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_3_2_2_85_1","volume-title":"Whispers in the Hyper-space: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud","author":"Wu Zhenyu","year":"2014","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2014. Whispers in the Hyper-space: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud . IEEE\/ACM Transactions on Networking ( 2014 ). Zhenyu Wu, Zhang Xu, and Haining Wang. 2014. Whispers in the Hyper-space: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud . IEEE\/ACM Transactions on Networking (2014)."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"crossref","unstructured":"Jidong Xiao Zhang Xu Hai Huang and Haining Wang. 2012. A covert channel construction in a virtualized environment. In CCS.  Jidong Xiao Zhang Xu Hai Huang and Haining Wang. 2012. A covert channel construction in a virtualized environment. In CCS.","DOI":"10.1145\/2382196.2382318"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575349"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"crossref","unstructured":"Y. Xu W. Cui and M. Peinado. 2015. Controlled-Channel Attacks : Deterministic Side Channels for Untrusted Operating Systems. In S&P .  Y. Xu W. Cui and M. Peinado. 2015. Controlled-Channel Attacks : Deterministic Side Channels for Untrusted Operating Systems. In S&P .","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_89_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. Flush  Yuval Yarom and Katrina Falkner. 2014. Flush"},{"key":"e_1_3_2_2_90_1","volume-title":"USENIX Security Symposium .","author":"Reload","unstructured":"Reload : a High Resolution, Low Noise, L3 Cache Side-Channel Attack . In USENIX Security Symposium . Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_91_1","volume-title":"NSA tempest documents . CRYPTOME","author":"Young J","year":"2002","unstructured":"J Young . 2002. NSA tempest documents . CRYPTOME ( 2002 ). J Young. 2002. NSA tempest documents . CRYPTOME (2002)."},{"key":"e_1_3_2_2_92_1","volume-title":"Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security Symposium.","author":"Zhang Kehuan","year":"2009","unstructured":"Kehuan Zhang and XiaoFeng Wang . 2009 . Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security Symposium. Kehuan Zhang and XiaoFeng Wang. 2009. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"crossref","unstructured":"Tianwei Zhang Yinqian Zhang and Ruby B Lee. 2018. Analyzing Cache Side Channels Using Deep Neural Networks. In ACSAC.  Tianwei Zhang Yinqian Zhang and Ruby B Lee. 2018. Analyzing Cache Side Channels Using Deep Neural Networks. In ACSAC.","DOI":"10.1145\/3274694.3274715"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"crossref","unstructured":"Yinqian Zhang Ari Juels Michael K. Reiter and Thomas Ristenpart. 2014. Cross-Tenant Side-Channel Attacks in PaaS Clouds. In CCS .  Yinqian Zhang Ari Juels Michael K. Reiter and Thomas Ristenpart. 2014. Cross-Tenant Side-Channel Attacks in PaaS Clouds. In CCS .","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3339809","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3339809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:01Z","timestamp":1750202641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":93,"alternative-id":["10.1145\/3319535.3339809","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3339809","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}