{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:27:10Z","timestamp":1760171230703,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3450100","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:03:16Z","timestamp":1622746996000},"page":"1005-1016","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CoResident Evil: Covert Communication In The Cloud With Lambdas"],"prefix":"10.1145","author":[{"given":"Anil","family":"Yelam","sequence":"first","affiliation":[{"name":"University of California, San Diego, USA"}]},{"given":"Shibani","family":"Subbareddy","sequence":"additional","affiliation":[{"name":"University of California, San Diego, USA"}]},{"given":"Keerthana","family":"Ganesan","sequence":"additional","affiliation":[{"name":"University of California, San Diego, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego, USA"}]},{"given":"Ariana","family":"Mirian","sequence":"additional","affiliation":[{"name":"University of California, San Diego, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Agache Alexandru","year":"2020","unstructured":"Alexandru Agache , Marc Brooker , Alexandra Iordache , Anthony Liguori , Rolf Neugebauer , Phil Piwonka , and Diana-Maria Popa . 2020 . Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 419\u2013434. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/agache Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. 2020. Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 419\u2013434. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/agache"},{"key":"e_1_3_2_1_2_1","unstructured":"aws 2018. Understanding Container Reuse in AWS Lambda. https:\/\/aws.amazon.com\/blogs\/compute\/container-reuse-in-lambda\/.  aws 2018. Understanding Container Reuse in AWS Lambda. https:\/\/aws.amazon.com\/blogs\/compute\/container-reuse-in-lambda\/."},{"key":"e_1_3_2_1_3_1","unstructured":"aws 2019. Amazon EC2. https:\/\/aws.amazon.com\/ec2\/.  aws 2019. Amazon EC2. https:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_4_1","unstructured":"aws 2019. Amazon VPC. https:\/\/aws.amazon.com\/vpc\/.  aws 2019. Amazon VPC. https:\/\/aws.amazon.com\/vpc\/."},{"key":"e_1_3_2_1_5_1","unstructured":"azure 2019. Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/.  azure 2019. Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar and Kevin Butler. 2012. Detecting co-residency with active traffic analysis techniques. https:\/\/doi.org\/10.1145\/2381913.2381915  Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar and Kevin Butler. 2012. Detecting co-residency with active traffic analysis techniques. https:\/\/doi.org\/10.1145\/2381913.2381915","DOI":"10.1145\/2381913.2381915"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"key":"e_1_3_2_1_8_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Fouladi Sadjad","year":"2019","unstructured":"Sadjad Fouladi , Francisco Romero , Dan Iter , Qian Li , Shuvo Chatterjee , Christos Kozyrakis , Matei Zaharia , and Keith Winstein . 2019 . From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 475\u2013488. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/fouladi Sadjad Fouladi, Francisco Romero, Dan Iter, Qian Li, Shuvo Chatterjee, Christos Kozyrakis, Matei Zaharia, and Keith Winstein. 2019. From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 475\u2013488. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/fouladi"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.49"},{"key":"e_1_3_2_1_10_1","unstructured":"gcp 2019. Google Cloud Functions. https:\/\/cloud.google.com\/functions\/.  gcp 2019. Google Cloud Functions. https:\/\/cloud.google.com\/functions\/."},{"volume-title":"Building and Breaking Burst-Parallel Systems. Master\u2019s thesis","author":"Izhikevich Elizabeth","key":"e_1_3_2_1_11_1","unstructured":"Elizabeth Izhikevich . 2018. Building and Breaking Burst-Parallel Systems. Master\u2019s thesis . University of California , San Diego . Elizabeth Izhikevich. 2018. Building and Breaking Burst-Parallel Systems. Master\u2019s thesis. University of California, San Diego."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Mehmet Kayaalp Nael Abu-Ghazaleh Dmitry Ponomarev and Aamer Jaleel. 2016. A high-resolution side-channel attack on last-level cache. 1\u20136. https:\/\/doi.org\/10.1145\/2897937.2897962  Mehmet Kayaalp Nael Abu-Ghazaleh Dmitry Ponomarev and Aamer Jaleel. 2016. A high-resolution side-channel attack on last-level cache. 1\u20136. https:\/\/doi.org\/10.1145\/2897937.2897962","DOI":"10.1145\/2897937.2897962"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7364082"},{"key":"e_1_3_2_1_14_1","unstructured":"Lambda 2019. AWS Lambda. https:\/\/aws.amazon.com\/lambda\/.  Lambda 2019. AWS Lambda. https:\/\/aws.amazon.com\/lambda\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Gernot Heiser, and Ruby Lee.","author":"Liu Fangfei","year":"2015","unstructured":"Fangfei Liu , Yuval Yarom , Qian ge , Gernot Heiser, and Ruby Lee. 2015 . Last-Level Cache Side-Channel Attacks are Practical, Vol .\u00a02015. 605\u2013622. https:\/\/doi.org\/10.1109\/SP.2015.43 Fangfei Liu, Yuval Yarom, Qian ge, Gernot Heiser, and Ruby Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical, Vol.\u00a02015. 605\u2013622. https:\/\/doi.org\/10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_16_1","volume-title":"Thermal Covert Channels on Multi-core Platforms. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Masti Ramya\u00a0Jayaram","year":"2015","unstructured":"Ramya\u00a0Jayaram Masti , Devendra Rai , Aanjhan Ranganathan , Christian M\u00fcller , Lothar Thiele , and Srdjan Capkun . 2015 . Thermal Covert Channels on Multi-core Platforms. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 865\u2013880. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/masti Ramya\u00a0Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian M\u00fcller, Lothar Thiele, and Srdjan Capkun. 2015. Thermal Covert Channels on Multi-core Platforms. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 865\u2013880. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/masti"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831198"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Clementine Maurice Manuel Weber Michael Schwarz Lukas Giner Daniel Gruss Carlo\u00a0Alberto Boano Stefan Mangard and Kay R\u00f6mer. 2017. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. https:\/\/doi.org\/10.14722\/ndss.2017.23294  Clementine Maurice Manuel Weber Michael Schwarz Lukas Giner Daniel Gruss Carlo\u00a0Alberto Boano Stefan Mangard and Kay R\u00f6mer. 2017. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. https:\/\/doi.org\/10.14722\/ndss.2017.23294","DOI":"10.14722\/ndss.2017.23294"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_20_1","unstructured":"Brendan Saltaformaggio D. Xu and X. Zhang. 2013. BusMonitor : A Hypervisor-Based Solution for Memory Bus Covert Channels.  Brendan Saltaformaggio D. Xu and X. Zhang. 2013. BusMonitor : A Hypervisor-Based Solution for Memory Bus Covert Channels."},{"key":"e_1_3_2_1_21_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Varadarajan Venkatanathan","year":"2015","unstructured":"Venkatanathan Varadarajan , Yinqian Zhang , Thomas Ristenpart , and Michael Swift . 2015 . A Placement Vulnerability Study in Multi-Tenant Public Clouds . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 913\u2013928. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 913\u2013928. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan"},{"key":"e_1_3_2_1_22_1","unstructured":"Venkatanathan Varadarajan Yinqian Zhang Thomas Ristenpart and Michael\u00a0M. Swift. 2015. A Placement Vulnerability Study in Multi-tenant Public Clouds. CoRR abs\/1507.03114. arxiv:1507.03114http:\/\/arxiv.org\/abs\/1507.03114  Venkatanathan Varadarajan Yinqian Zhang Thomas Ristenpart and Michael\u00a0M. Swift. 2015. A Placement Vulnerability Study in Multi-tenant Public Clouds. CoRR abs\/1507.03114. arxiv:1507.03114http:\/\/arxiv.org\/abs\/1507.03114"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Mario Villamizar Oscar Garc\u00e9s Lina Ochoa Harold Castro Lorena Salamanca Mauricio Verano\u00a0Merino Rubby Casallas Santiago Gil Carlos Valencia Angee Zambrano and Mery Lang. 2016. Infrastructure Cost Comparison of Running Web Applications in the Cloud Using AWS Lambda and Monolithic and Microservice Architectures. https:\/\/doi.org\/10.1109\/CCGrid.2016.37  Mario Villamizar Oscar Garc\u00e9s Lina Ochoa Harold Castro Lorena Salamanca Mauricio Verano\u00a0Merino Rubby Casallas Santiago Gil Carlos Valencia Angee Zambrano and Mery Lang. 2016. Infrastructure Cost Comparison of Running Web Applications in the Cloud Using AWS Lambda and Monolithic and Microservice Architectures. https:\/\/doi.org\/10.1109\/CCGrid.2016.37","DOI":"10.1109\/CCGrid.2016.37"},{"key":"e_1_3_2_1_24_1","volume-title":"Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Wang Liang","year":"2018","unstructured":"Liang Wang , Mengyuan Li , Yinqian Zhang , Thomas Ristenpart , and Michael Swift . 2018 . Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 133\u2013146. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/wang-liang Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2018. Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 133\u2013146. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/wang-liang"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Wu Zhenyu","key":"e_1_3_2_1_26_1","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) . USENIX , Bellevue, WA , 159\u2013173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). USENIX, Bellevue, WA, 159\u2013173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_1_29_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu , Haining Wang , and Zhenyu Wu . 2015 . A Measurement Study on Co-residence Threat inside the Cloud . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 929\u2013944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat inside the Cloud. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 929\u2013944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_30_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu , Haining Wang , and Zhenyu Wu . 2015 . A Measurement Study on Co-residence Threat inside the Cloud . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 929\u2013944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat inside the Cloud. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 929\u2013944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_31_1","unstructured":"Tianwei Zhang Yinqian Zhang and Ruby Lee. 2016. Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation.  Tianwei Zhang Yinqian Zhang and Ruby Lee. 2016. Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation."},{"volume-title":"Information and Communications Security, Kwok-Yan Lam, Chi-Hung Chi","author":"Zhang Weijuan","key":"e_1_3_2_1_32_1","unstructured":"Weijuan Zhang , Xiaoqi Jia , Chang Wang , Shengzhi Zhang , Qingjia Huang , Mingsheng Wang , and Peng Liu . 2016. A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds . In Information and Communications Security, Kwok-Yan Lam, Chi-Hung Chi , and Sihan Qing(Eds.). Springer International Publishing , Cham , 361\u2013375. Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, and Peng Liu. 2016. A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. In Information and Communications Security, Kwok-Yan Lam, Chi-Hung Chi, and Sihan Qing(Eds.). Springer International Publishing, Cham, 361\u2013375."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Weijuan Zhang Xiaoqi Jia Chang Wang Shengzhi Zhang Qingjia Huang Mingsheng Wang and Peng Liu. 2016. A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds Vol.\u00a09977. 361\u2013375. https:\/\/doi.org\/10.1007\/978-3-319-50011-9_28  Weijuan Zhang Xiaoqi Jia Chang Wang Shengzhi Zhang Qingjia Huang Mingsheng Wang and Peng Liu. 2016. A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds Vol.\u00a09977. 361\u2013375. https:\/\/doi.org\/10.1007\/978-3-319-50011-9_28","DOI":"10.1007\/978-3-319-50011-9_28"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Yinqian Zhang Ari Juels Alina Oprea and Michael Reiter. 2011. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. 313 \u2013 328. https:\/\/doi.org\/10.1109\/SP.2011.31  Yinqian Zhang Ari Juels Alina Oprea and Michael Reiter. 2011. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. 313 \u2013 328. https:\/\/doi.org\/10.1109\/SP.2011.31","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"WWW '21: The Web Conference 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Ljubljana Slovenia","acronym":"WWW '21"},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3450100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:27Z","timestamp":1750195467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":35,"alternative-id":["10.1145\/3442381.3450100","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3450100","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}