{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:45:42Z","timestamp":1772725542552,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["faculty research award"],"award-info":[{"award-number":["faculty research award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["ISRA"],"award-info":[{"award-number":["ISRA"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CAREER-1452994"],"award-info":[{"award-number":["CAREER-1452994"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378453","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"1125-1140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Safecracker: Leaking Secrets through Compressed Caches"],"prefix":"10.1145","author":[{"given":"Po-An","family":"Tsai","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Andres","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Daniel","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology (CT-RSA'07)","author":"Aciicmez Onur","year":"2006","unstructured":"Onur Aciicmez , Cetin Kaya Koc , and Jean-Pierre Seifert . 2006 . Predicting Secret Keys via Branch Prediction . In Proc. of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology (CT-RSA'07) . Onur Aciicmez, Cetin Kaya Koc, and Jean-Pierre Seifert. 2006. Predicting Secret Keys via Branch Prediction. In Proc. of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology (CT-RSA'07)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23284"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2004.1310776"},{"key":"e_1_3_2_1_5_1","volume-title":"Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri.","author":"Aldaya Alejandro Cabrera","year":"2018","unstructured":"Alejandro Cabrera Aldaya , Billy Bob Brumley , Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2018 . Port Contention for Fun and Profit. Cryptology ePrint Archive, Report 2018\/1060. https:\/\/eprint.iacr.org\/2018\/1060. Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2018. Port Contention for Fun and Profit. Cryptology ePrint Archive, Report 2018\/1060. https:\/\/eprint.iacr.org\/2018\/1060."},{"key":"e_1_3_2_1_6_1","unstructured":"AMD. 2015. AMD Radeon R9 Fury X Graphics Card .  AMD. 2015. AMD Radeon R9 Fury X Graphics Card ."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) .","author":"Andrysco M.","unstructured":"M. Andrysco , D. Kohlbrenner , K. Mowery , R. Jhala , S. Lerner , and H. Shacham . 2015. On Subnormal Floating Point and Abnormal Timing . In Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) . M. Andrysco, D. Kohlbrenner, K. Mowery, R. Jhala , S. Lerner, and H. Shacham. 2015. On Subnormal Floating Point and Abnormal Timing. In Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830823"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665696"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056061"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"e_1_3_2_1_15_1","volume-title":"Hacking Blind. In Proc. of the 2014 IEEE Symposium on Security and Privacy (SP) .","author":"Bittau A.","unstructured":"A. Bittau , A. Belay , A. Mashtizadeh , D. Mazi\u00e8res , and D. Boneh . 2014 . Hacking Blind. In Proc. of the 2014 IEEE Symposium on Security and Privacy (SP) . A. Bittau, A. Belay , A. Mashtizadeh, D. Mazi\u00e8res, and D. Boneh. 2014. Hacking Blind. In Proc. of the 2014 IEEE Symposium on Security and Privacy (SP) ."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the 27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00051"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2821163"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_1_20_1","volume-title":"Elements of information theory","author":"Cover Thomas M","unstructured":"Thomas M Cover and Joy A Thomas . 2012. Elements of information theory . John Wiley & Sons . Thomas M Cover and Joy A Thomas. 2012. Elements of information theory .John Wiley & Sons."},{"key":"e_1_3_2_1_21_1","volume-title":"Julius Mandelblat, Anirudha Rahatekar, Lihu Rappoport, Efraim Rotem, Ahmad Yasin, and Adi Yoaz.","author":"Doweck Jack","year":"2017","unstructured":"Jack Doweck , Wen-Fu Kao , Allen Kuan-yu Lu , Julius Mandelblat, Anirudha Rahatekar, Lihu Rappoport, Efraim Rotem, Ahmad Yasin, and Adi Yoaz. 2017 . Inside 6th-Generation Intel Core : New Microarchitecture Code-Named Skylake. IEEE Micro , Vol. 37 , 2 (2017). Jack Doweck, Wen-Fu Kao, Allen Kuan-yu Lu, Julius Mandelblat, Anirudha Rahatekar, Lihu Rappoport, Efraim Rotem, Ahmad Yasin, and Adi Yoaz. 2017. Inside 6th-Generation Intel Core: New Microarchitecture Code-Named Skylake. IEEE Micro , Vol. 37, 2 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062388"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542288"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. VLDB Endow.","volume":"13","author":"Eskandarian Saba","year":"2019","unstructured":"Saba Eskandarian and Matei Zaharia . 2019 . ObliDB: Oblivious Query Processing for Secure Databases . Proc. VLDB Endow. , Vol. 13 , 2 (2019). Saba Eskandarian and Matei Zaharia. 2019. ObliDB: Oblivious Query Processing for Secure Databases. Proc. VLDB Endow. , Vol. 13, 2 (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"e_1_3_2_1_29_1","unstructured":"Anders Fogh and Christopher Ertl. 2018. Wrangling with the Ghost: Aninside story of mitigating speculative execution side channel vulnerabilities. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf  Anders Fogh and Christopher Ertl. 2018. Wrangling with the Ghost: Aninside story of mitigating speculative execution side channel vulnerabilities. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304037"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.36"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134029"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of the 27th USENIX Security Symposium (USENIX Security 18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2018 . Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks . In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) . Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) ."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of the 2009 Intl. Conf. on Information Security and Cryptology (ICISC'09)","author":"Johann","year":"2009","unstructured":"Johann Gro\u00dfsch\"adl, Elisabeth Oswald , Dan Page , and Michael Tunstall . 2009 . Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications . In Proc. of the 2009 Intl. Conf. on Information Security and Cryptology (ICISC'09) . Johann Gro\u00dfsch\"adl, Elisabeth Oswald, Dan Page, and Michael Tunstall. 2009. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. In Proc. of the 2009 Intl. Conf. on Information Security and Cryptology (ICISC'09) ."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_6"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of the 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Marcus","year":"2017","unstructured":"Marcus H\"ahnel, Weidong Cui , and Marcus Peinado . 2017 . High-Resolution Side Channels for Untrusted Operating Systems . In Proc. of the 2017 USENIX Annual Technical Conference (USENIX ATC 17) . Marcus H\"ahnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In Proc. of the 2017 USENIX Annual Technical Conference (USENIX ATC 17) ."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.4"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321431"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. MoBS","author":"Hilton Andrew","year":"2009","unstructured":"Andrew Hilton , Neeraj Eswaran , and Amir Roth . 2009 . FIESTA: A sample-balanced multi-program workload methodology . Proc. MoBS (2009). Andrew Hilton, Neeraj Eswaran, and Amir Roth. 2009. FIESTA: A sample-balanced multi-program workload methodology . Proc. MoBS (2009)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3151033"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.37"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2017.12"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00014"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of the 27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In Proc. of the 27th USENIX Security Symposium (USENIX Security 18) ."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of the 22nd IEEE intl. symp. on High Performance Computer Architecture (HPCA-22)","author":"Liu F.","unstructured":"F. Liu , Q. Ge , Y. Yarom , F. Mckeen , C. Rozas , G. Heiser , and R. B. Lee . 2016. CATalyst: Defeating last-level cache side channel attacks in cloud computing . In Proc. of the 22nd IEEE intl. symp. on High Performance Computer Architecture (HPCA-22) . F. Liu, Q. Ge, Y. Yarom, F. Mckeen, C. Rozas, G. Heiser, and R. B. Lee. 2016. CATalyst: Defeating last-level cache side channel attacks in cloud computing. In Proc. of the 22nd IEEE intl. symp. on High Performance Computer Architecture (HPCA-22) ."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_50_1","unstructured":"Ross McIlroy Jaroslav Sevcik Tobias Tebbi Ben L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. In arXiv preprint arXiv:1902.05178 .  Ross McIlroy Jaroslav Sevcik Tobias Tebbi Ben L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. In arXiv preprint arXiv:1902.05178 ."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830790"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of the 2018 IEEE Symposium on Security and Privacy (SP) .","author":"Mishra P.","unstructured":"P. Mishra , R. Poddar , J. Chen , A. Chiesa , and R. A. Popa . 2018. Oblix: An Efficient Oblivious Search Index . In Proc. of the 2018 IEEE Symposium on Security and Privacy (SP) . P. Mishra, R. Poddar , J. Chen, A. Chiesa, and R. A. Popa. 2018. Oblix: An Efficient Oblivious Search Index. In Proc. of the 2018 IEEE Symposium on Security and Privacy (SP) ."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0611-9"},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of the 2005 Intl. Conf. on Information Security and Cryptology (ICISC) .","author":"Molnar David","year":"2005","unstructured":"David Molnar , Matt Piotrowski , David Schultz , and David Wagner . 2005 . The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks . In Proc. of the 2005 Intl. Conf. on Information Security and Cryptology (ICISC) . David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In Proc. of the 2005 Intl. Conf. on Information Security and Cryptology (ICISC) ."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830828"},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. of the 25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , Cedric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors . In Proc. of the 25th USENIX Security Symposium (USENIX Security 16) . Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In Proc. of the 25th USENIX Security Symposium (USENIX Security 16) ."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108094"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750377"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783704"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446064"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370816.2370870"},{"key":"e_1_3_2_1_63_1","volume-title":"Proc. of the 25th USENIX Security Symposium (USENIX Security 16)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks . In Proc. of the 25th USENIX Security Symposium (USENIX Security 16) . Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In Proc. of the 25th USENIX Security Symposium (USENIX Security 16) ."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of the 32nd annual Intl. Symp. on Computer Architecture (ISCA-32)","author":"Qureshi Moinuddin K.","unstructured":"Moinuddin K. Qureshi , David Thompson , and Yale N. Patt . 2005. The V-Way cache: Demand based associativity via global replacement . In Proc. of the 32nd annual Intl. Symp. on Computer Architecture (ISCA-32) . Moinuddin K. Qureshi, David Thompson, and Yale N. Patt. 2005. The V-Way cache: Demand based associativity via global replacement. In Proc. of the 32nd annual Intl. Symp. on Computer Architecture (ISCA-32) ."},{"key":"e_1_3_2_1_66_1","volume-title":"Proc. of the 24th USENIX Security Symposium (USENIX Security 15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution . In Proc. of the 24th USENIX Security Symposium (USENIX Security 15) . Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In Proc. of the 24th USENIX Security Symposium (USENIX Security 15) ."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000073"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485963"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.41"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540715"},{"key":"e_1_3_2_1_71_1","volume-title":"Proc. of the 25th Annual Network and Distributed System Security Symposium (NDSS-25)","author":"Sasy Sajin","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W. Fletcher . 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX . In Proc. of the 25th Annual Network and Distributed System Security Symposium (NDSS-25) . Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. In Proc. of the 25th Annual Network and Distributed System Security Symposium (NDSS-25) ."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_73_1","volume-title":"A mathematical theory of communication. Bell system technical journal","author":"Shannon Claude Elwood","year":"1948","unstructured":"Claude Elwood Shannon . 1948. A mathematical theory of communication. Bell system technical journal , Vol. 27 , 3 ( 1948 ). Claude Elwood Shannon. 1948. A mathematical theory of communication. Bell system technical journal , Vol. 27, 3 (1948)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134095"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972552"},{"key":"e_1_3_2_1_76_1","volume-title":"Proc. of the Intl. Conf. on Supercomputing (ICS'16)","author":"Tian Yingying","year":"2016","unstructured":"Yingying Tian , Samira M Khan , Daniel A Jim\u00e9nez , and Gabriel H Loh . 2016 . Last-level cache deduplication . In Proc. of the Intl. Conf. on Supercomputing (ICS'16) . Yingying Tian, Samira M Khan, Daniel A Jim\u00e9nez, and Gabriel H Loh. 2016. Last-level cache deduplication. In Proc. of the Intl. Conf. on Supercomputing (ICS'16) ."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_2"},{"key":"e_1_3_2_1_78_1","volume-title":"IBM memory expansion technology (MXT). IBM Journal of Research and Development","author":"Tremaine R Brett","year":"2001","unstructured":"R Brett Tremaine , Peter A Franaszek , John T Robinson , Charles O Schulz , T Basil Smith , Michael E Wazlowski , and P Maurice Bland . 2001. IBM memory expansion technology (MXT). IBM Journal of Research and Development ( 2001 ). R Brett Tremaine, Peter A Franaszek, John T Robinson, Charles O Schulz, T Basil Smith, Michael E Wazlowski, and P Maurice Bland. 2001. IBM memory expansion technology (MXT). IBM Journal of Research and Development (2001)."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080214"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00025"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304006"},{"key":"e_1_3_2_1_82_1","first-page":"2012","volume":"201","author":"Vulnerabilities Common","unstructured":"Common Vulnerabilities and Exposures. 201 2. CVE- 2012 -- 4929 . Available from MITRE, CVE-ID CVE-2012--4929. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2012--4929 Common Vulnerabilities and Exposures. 2012. CVE-2012--4929. Available from MITRE, CVE-ID CVE-2012--4929. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2012--4929","journal-title":"Exposures."},{"key":"e_1_3_2_1_83_1","volume-title":"Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17)","author":"Wang Wenhao","unstructured":"Wenhao Wang , Guoxing Chen , Xiaorui Pan , Yinqian Zhang , XiaoFeng Wang , Vincent Bindschaedler , Haixu Tang , and Carl A. Gunter . 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX . In Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17) . Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter. 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17)."},{"key":"e_1_3_2_1_84_1","volume-title":"Proc. of the 34th annual Intl. Symp. on Computer Architecture (ISCA-34)","author":"Wang Zhenghong","unstructured":"Zhenghong Wang and Ruby B. Lee . 2007. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks . In Proc. of the 34th annual Intl. Symp. on Computer Architecture (ISCA-34) . Zhenghong Wang and Ruby B. Lee. 2007. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks. In Proc. of the 34th annual Intl. Symp. on Computer Architecture (ISCA-34) ."},{"key":"e_1_3_2_1_85_1","volume-title":"Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) .","author":"Xu Y.","unstructured":"Y. Xu , W. Cui , and M. Peinado . 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems . In Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) . Y. Xu, W. Cui, and M. Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In Proc. of the 2015 IEEE Symposium on Security and Privacy (SP) ."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080222"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"e_1_3_2_1_88_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH  Yuval Yarom and Katrina Falkner. 2014. FLUSH"},{"key":"e_1_3_2_1_89_1","volume-title":"Proc. of the 23rd USENIX Security Symposium (USENIX Security 14)","author":"RELOAD","unstructured":"RELOAD : A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In Proc. of the 23rd USENIX Security Symposium (USENIX Security 14) . RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proc. of the 23rd USENIX Security Symposium (USENIX Security 14) ."},{"key":"e_1_3_2_1_90_1","volume-title":"CacheBleed: A timing attack on OpenSSL constant-time RSA. Journal of Cryptographic Engineering","author":"Yarom Yuval","year":"2017","unstructured":"Yuval Yarom , Daniel Genkin , and Nadia Heninger . 2017. CacheBleed: A timing attack on OpenSSL constant-time RSA. Journal of Cryptographic Engineering ( 2017 ). Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2017. CacheBleed: A timing attack on OpenSSL constant-time RSA. Journal of Cryptographic Engineering (2017)."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080243"},{"key":"e_1_3_2_1_92_1","volume-title":"Proc. of the 26th Annual Network and Distributed System Security Symposium (NDSS-26)","author":"Yu Jiyong","unstructured":"Jiyong Yu , Lucas Hsiung , Mohamad El Hajj , and Christopher W. Fletcher . 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing . In Proc. of the 26th Annual Network and Distributed System Security Symposium (NDSS-26) . Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, and Christopher W. Fletcher. 2019. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In Proc. of the 26th Annual Network and Distributed System Security Symposium (NDSS-26) ."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644558"},{"key":"e_1_3_2_1_94_1","volume-title":"Proc. of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform . In Proc. of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In Proc. of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) ."}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378453","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":92,"alternative-id":["10.1145\/3373376.3378453","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378453","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}