{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:05:16Z","timestamp":1755839116026,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-1723571, CNS-1956032"],"award-info":[{"award-number":["CCF-1723571, CNS-1956032"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447846","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"233-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Ghost Thread"],"prefix":"10.1145","author":[{"given":"Robert","family":"Brotzman","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Danfeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Mahmut","family":"Kandemir","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal , Bruce Archambeault , Josyula R. Rao , and Pankaj Rohatgi . 2003. The EM Side--Channel(s) . In Cryptographic Hardware and Embedded Systems - CHES 2002 , Burton S. Kaliski, cc etin K. Kocc, and Christof Paar (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 29--45. Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. 2003. The EM Side--Channel(s). In Cryptographic Hardware and Embedded Systems - CHES 2002, Burton S. Kaliski, cc etin K. Kocc, and Christof Paar (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 29--45."},{"key":"e_1_3_2_2_2_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Almeida Jos\u00e9 Bacelar","year":"2016","unstructured":"Jos\u00e9 Bacelar Almeida , Manuel Barbosa , Gilles Barthe , Francc ois Dupressoir , and Michael Emmi . 2016 Verifying constant-time implementations . In 25th USENIX Security Symposium (USENIX Security 16) . 53--70. Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Francc ois Dupressoir, and Michael Emmi. 2016 Verifying constant-time implementations. In 25th USENIX Security Symposium (USENIX Security 16). 53--70."},{"key":"e_1_3_2_2_3_1","unstructured":"Daniel J. Bernstein. 2005. Cache-timing attacks on AES. cr.yp.to\/papers.html#cachetiming.  Daniel J. Bernstein. 2005. Cache-timing attacks on AES. cr.yp.to\/papers.html#cachetiming."},{"key":"e_1_3_2_2_4_1","volume-title":"CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation. In 2019 IEEE Symposium on Security and Privacy (SP). 364--380","author":"Brotzman R.","year":"2019","unstructured":"R. Brotzman , S. Liu , D. Zhang , G. Tan , and M. Kandemir . 2019 . CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation. In 2019 IEEE Symposium on Security and Privacy (SP). 364--380 . https:\/\/doi.org\/10.1109\/SP. 2019 .00022 10.1109\/SP.2019.00022 R. Brotzman, S. Liu, D. Zhang, G. Tan, and M. Kandemir. 2019. CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation. In 2019 IEEE Symposium on Security and Privacy (SP). 364--380. https:\/\/doi.org\/10.1109\/SP.2019.00022"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.. In NDSS. 8--11.  Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.. In NDSS. 8--11.","DOI":"10.14722\/ndss.2015.23264"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337172"},{"key":"e_1_3_2_2_8_1","volume-title":"Proc. the 22nd USENIX Security Symposium (USENIX Security). 431--446","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris Kopf , Laurent Mauborgne , and Jan Reineke . 2013 . CacheAudit: A Tool for the Static Analysis of Cache Side Channels . In Proc. the 22nd USENIX Security Symposium (USENIX Security). 431--446 . Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In Proc. the 22nd USENIX Security Symposium (USENIX Security). 431--446."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062388"},{"key":"e_1_3_2_2_11_1","unstructured":"Jeff Fulme. 2018. siege. https:\/\/github.com\/JoeDog\/siege.  Jeff Fulme. 2018. siege. https:\/\/github.com\/JoeDog\/siege."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_2_13_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olya Ohrimenko , Istvan Haller , and Manuel Costa . 2017 . Strong and efficient cache side-channel protection using hardware transactional memory . In 26th USENIX Security Symposium (USENIX Security 17) . 217--233. Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and efficient cache side-channel protection using hardware transactional memory. In 26th USENIX Security Symposium (USENIX Security 17). 217--233."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice and Klaus Wagner. 2016. Flush+Flush: A Stealthier Last-Level Cache Attack. In DIMVA.  Daniel Gruss Cl\u00e9mentine Maurice and Klaus Wagner. 2016. Flush+Flush: A Stealthier Last-Level Cache Attack. In DIMVA.","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C.) (SEC'15)","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss , Raphael Spreitzer , and Stefan Mangard . 2015 . Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches . In Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C.) (SEC'15) . USENIX Association, Berkeley, CA, USA, 897--912. Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-level Caches. In Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C.) (SEC'15). USENIX Association, Berkeley, CA, USA, 897--912."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"volume-title":"Proc. IEEE Symp. on Security and Privacy (S&P). 591--604","author":"Irazoqui G.","key":"e_1_3_2_2_18_1","unstructured":"G. Irazoqui , T. Eisenbarth , and B. Sunar . 2015. SEA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES . In Proc. IEEE Symp. on Security and Privacy (S&P). 591--604 . G. Irazoqui, T. Eisenbarth, and B. Sunar. 2015. SEA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES. In Proc. IEEE Symp. on Security and Privacy (S&P). 591--604."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_2_20_1","series-title":"Lecture Notes in Computer Science","volume-title":"Cross-VM Attack on AES. In Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.)","author":"Irazoqui Gorka","unstructured":"Gorka Irazoqui , MehmetSinan Inci , Thomas Eisenbarth , and Berk Sunar . 2014. Wait a Minute! A fast , Cross-VM Attack on AES. In Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.) . Lecture Notes in Computer Science , Vol. 8688 . 299--319. Gorka Irazoqui, MehmetSinan Inci, Thomas Eisenbarth, and Berk Sunar. 2014. Wait a Minute! A fast, Cross-VM Attack on AES. In Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.). Lecture Notes in Computer Science, Vol. 8688. 299--319."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_1"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium. 189--204","author":"Kim Taesoo","year":"2012","unstructured":"Taesoo Kim , Marcus Peinado , and Gloria Mainar-Ruiz . 2012 . STEALTHMEM: System-level Protection Against Cache-based Side Channel Attacks in the Cloud . In Proceedings of the 21st USENIX Conference on Security Symposium. 189--204 . Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM: System-level Protection Against Cache-based Side Channel Attacks in the Cloud. In Proceedings of the 21st USENIX Conference on Security Symposium. 189--204."},{"key":"e_1_3_2_2_23_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19) . Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)."},{"volume-title":"Advances in Cryptology -- CRYPTO' 99,","author":"Kocher Paul","key":"e_1_3_2_2_24_1","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential Power Analysis . In Advances in Cryptology -- CRYPTO' 99, , Michael Wiener (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology -- CRYPTO' 99,, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 388--397."},{"volume-title":"Proc. 19textsuperscriptth Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 97--112","author":"Li Xun","key":"e_1_3_2_2_25_1","unstructured":"Xun Li , Vineeth Kashyap , Jason K. Oberg , Mohit Tiwari , Vasanth Ram Rajarathinam , Ryan Kastner , Timothy Sherwood , Ben Hardekopf , and Frederic T. Chong . 2014. Sapper: A Language for Hardware-level Security Policy Enforcement . In Proc. 19textsuperscriptth Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 97--112 . Xun Li, Vineeth Kashyap, Jason K. Oberg, Mohit Tiwari, Vasanth Ram Rajarathinam, Ryan Kastner, Timothy Sherwood, Ben Hardekopf, and Frederic T. Chong. 2014. Sapper: A Language for Hardware-level Security Policy Enforcement. In Proc. 19textsuperscriptth Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 97--112."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp , Daniel Gruss , Raphael Spreitzer , Cl\u00e9mentine Maurice , and Stefan Mangard . 2016 . ARMageddon: Cache Attacks on Mobile Devices . In Proceedings of the 25th USENIX Conference on Security Symposium ( Austin, TX, USA) (SEC'16). USENIX Association, Berkeley, CA, USA, 549--564. http:\/\/dl.acm.org\/citation.cfm?id=3241094.3241138 Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In Proceedings of the 25th USENIX Conference on Security Symposium (Austin, TX, USA) (SEC'16). USENIX Association, Berkeley, CA, USA, 549--564. http:\/\/dl.acm.org\/citation.cfm?id=3241094.3241138"},{"key":"e_1_3_2_2_27_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"volume-title":"Proc. 47th Annual IEEE\/ACM Int'l Symp. on Microarchitecture (MICRO). 203--215","author":"Liu Fangfei","key":"e_1_3_2_2_30_1","unstructured":"Fangfei Liu and Ruby B. Lee . 2014. Random Fill Cache Architecture . In Proc. 47th Annual IEEE\/ACM Int'l Symp. on Microarchitecture (MICRO). 203--215 . Fangfei Liu and Ruby B. Lee. 2014. Random Fill Cache Architecture. In Proc. 47th Annual IEEE\/ACM Int'l Symp. on Microarchitecture (MICRO). 203--215."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.85"},{"volume-title":"Security and Privacy (SP), 2015 IEEE Symposium on. 605--622","author":"Liu Fangfei","key":"e_1_3_2_2_32_1","unstructured":"Fangfei Liu , Y. Yarom , Qian Ge , G. Heiser , and R.B. Lee . 2015b. Last-Level Cache Side-Channel Attacks are Practical . In Security and Privacy (SP), 2015 IEEE Symposium on. 605--622 . Fangfei Liu, Y. Yarom, Qian Ge, G. Heiser, and R.B. Lee. 2015b. Last-Level Cache Side-Channel Attacks are Practical. In Security and Privacy (SP), 2015 IEEE Symposium on. 605--622."},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Mangard Stefan","key":"e_1_3_2_2_33_1","unstructured":"Stefan Mangard . 2004. Hardware countermeasures against DPA--a statistical analysis of their effectiveness . In Cryptographers' Track at the RSA Conference . Springer , 222--235. Stefan Mangard. 2004. Hardware countermeasures against DPA--a statistical analysis of their effectiveness. In Cryptographers' Track at the RSA Conference. Springer, 222--235."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_14"},{"key":"e_1_3_2_2_35_1","volume-title":"2006 a. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan","author":"Osvik Dag A.","year":"2006","unstructured":"Dag A. Osvik , Adi Shamir , and Eran Tromer . 2006 a. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan . 2006 ), 1--20. Dag A. Osvik, Adi Shamir, and Eran Tromer. 2006 a. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan. 2006), 1--20."},{"key":"e_1_3_2_2_36_1","volume-title":"2006 b. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan","author":"Osvik Dag A.","year":"2006","unstructured":"Dag A. Osvik , Adi Shamir , and Eran Tromer . 2006 b. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan . 2006 ), 1--20. Dag A. Osvik, Adi Shamir, and Eran Tromer. 2006 b. Cache attacks and countermeasures: the case of AES. Topics in Cryptology--CT-RSA 2006 (Jan. 2006), 1--20."},{"key":"e_1_3_2_2_37_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 431--446. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 431--446. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Michael Schwarz Moritz Lipp Daniel Gruss Samuel Weiser Cl\u00e9mentine Maurice Raphael Spreitzer and Stefan Mangard. 2018. KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. In NDSS.  Michael Schwarz Moritz Lipp Daniel Gruss Samuel Weiser Cl\u00e9mentine Maurice Raphael Spreitzer and Stefan Mangard. 2018. KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. In NDSS.","DOI":"10.14722\/ndss.2018.23027"},{"key":"e_1_3_2_2_40_1","volume-title":"Cl\u00e9 mentine Maurice, and Stefan Mangard","author":"Schwarz Michael","year":"2017","unstructured":"Michael Schwarz , Samuel Weiser , Daniel Gruss , Cl\u00e9 mentine Maurice, and Stefan Mangard . 2017 . Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA. Michael Schwarz, Samuel Weiser, Daniel Gruss, Cl\u00e9 mentine Maurice, and Stefan Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In DIMVA."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_25"},{"key":"e_1_3_2_2_42_1","volume-title":"USENIX Security Symposium. 687--702","author":"Varadarajan Venkatanathan","year":"2014","unstructured":"Venkatanathan Varadarajan , Thomas Ristenpart , and Michael M Swift . 2014 . Scheduler-based Defenses against Cross-VM Side-channels .. In USENIX Security Symposium. 687--702 . Venkatanathan Varadarajan, Thomas Ristenpart, and Michael M Swift. 2014. Scheduler-based Defenses against Cross-VM Side-channels.. In USENIX Security Symposium. 687--702."},{"key":"e_1_3_2_2_43_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Wang Shuai","year":"2019","unstructured":"Shuai Wang , Yuyan Bao , Xiao Liu , Pei Wang , Danfeng Zhang , and Dinghao Wu . 2019 . Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 657--674. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/wang-shuai Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 657--674. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/wang-shuai"},{"key":"e_1_3_2_2_44_1","volume-title":"Proc. the 26th USENIX Security Symposium (USENIX Security). 235--252","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang , Pei Wang , Xiao Liu , Danfeng Zhang , and Dinghao Wu . 2017 . CacheD: Identifying Cache-Based Timing Channels in Production Software . In Proc. the 26th USENIX Security Symposium (USENIX Security). 235--252 . Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. CacheD: Identifying Cache-Based Timing Channels in Production Software. In Proc. the 26th USENIX Security Symposium (USENIX Security). 235--252."},{"volume-title":"Proc. Annual International Symp. on Computer Architecture (ISCA). 494--505","author":"Wang Zhenghong","key":"e_1_3_2_2_45_1","unstructured":"Zhenghong Wang and Ruby B. Lee . 2007. New cache designs for thwarting software cache-based side channel attacks . In Proc. Annual International Symp. on Computer Architecture (ISCA). 494--505 . http:\/\/dl.acm.org\/citation.cfm?id=1250723 Zhenghong Wang and Ruby B. Lee. 2007. New cache designs for thwarting software cache-based side channel attacks. In Proc. Annual International Symp. on Computer Architecture (ISCA). 494--505. http:\/\/dl.acm.org\/citation.cfm?id=1250723"},{"key":"e_1_3_2_2_46_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium. 719--732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack . In Proceedings of the 23rd USENIX Conference on Security Symposium. 719--732 . Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-channel Attack. In Proceedings of the 23rd USENIX Conference on Security Symposium. 719--732."},{"volume-title":"CHES (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y","author":"Yarom Yuval","key":"e_1_3_2_2_47_1","unstructured":"Yuval Yarom , Daniel Genkin , and Nadia Heninger . 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA .. In CHES (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y . Poschmann (Eds.), Vol. 9813 . Springer , 346--367 Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.. In CHES (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.), Vol. 9813. Springer, 346--367"},{"volume-title":"Proc. 20th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 503?516","author":"Zhang Danfeng","key":"e_1_3_2_2_48_1","unstructured":"Danfeng Zhang , Yao Wang , G. Edward Suh , and Andrew C. Myers . 2015. A Hardware Design Language for Timing-Sensitive Information-Flow Security . In Proc. 20th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 503?516 . Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers. 2015. A Hardware Design Language for Timing-Sensitive Information-Flow Security. In Proc. 20th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 503?516."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2487728"},{"volume-title":"Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy (Tel-Aviv, Israel) (HASP '13)","author":"Zhang Tianwei","key":"e_1_3_2_2_50_1","unstructured":"Tianwei Zhang , Fangfei Liu , Si Chen , and Ruby B. Lee . 2013b. Side Channel Vulnerability Metrics: The Promise and the Pitfalls . In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy (Tel-Aviv, Israel) (HASP '13) . ACM, New York, NY, USA, Article 2, 8 pages. https:\/\/doi.org\/10.1145\/2487726.2487728 10.1145\/2487726.2487728 Tianwei Zhang, Fangfei Liu, Si Chen, and Ruby B. Lee. 2013b. Side Channel Vulnerability Metrics: The Promise and the Pitfalls. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy (Tel-Aviv, Israel) (HASP '13). ACM, New York, NY, USA, Article 2, 8 pages. https:\/\/doi.org\/10.1145\/2487726.2487728"},{"volume-title":"Proc. ACM Conf. on Computer and Communications Security (CCS). 827--838","author":"Zhang Yinqian","key":"e_1_3_2_2_51_1","unstructured":"Yinqian Zhang and Michael K. Reiter . 2013. D\u00fcPpel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud . In Proc. ACM Conf. on Computer and Communications Security (CCS). 827--838 . Yinqian Zhang and Michael K. Reiter. 2013. D\u00fcPpel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud. In Proc. ACM Conf. on Computer and Communications Security (CCS). 827--838."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447846","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447846","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447846"}},"subtitle":["Effective User-Space Cache Side Channel Protection"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":50,"alternative-id":["10.1145\/3422337.3447846","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447846","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}