{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:03:08Z","timestamp":1769925788157,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["439797619,427774779"],"award-info":[{"award-number":["439797619,427774779"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484783","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2456-2473","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Util::Lookup"],"prefix":"10.1145","author":[{"given":"Florian","family":"Sieck","sequence":"first","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Sebastian","family":"Berndt","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Jan","family":"Wichelmann","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.196-221"},{"key":"e_1_3_2_2_2_1","unstructured":"Alibaba. Accessed: 2021. Inclavare Containers. https:\/\/inclavare-containers.io\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Alibaba. Accessed: 2021. Inclavare Containers - enclave-tls README. https:\/\/github.com\/alibaba\/inclavare-containers\/blob\/master\/enclave-tls\/README.md."},{"key":"e_1_3_2_2_4_1","unstructured":"Ittai Anati Shay Gueron Simon Johnson and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. White Paper."},{"key":"e_1_3_2_2_5_1","volume-title":"IEEE Symposium on Security and Privacy. IEEE Computer Society, 591--604","author":"Apecechea Gorka Irazoqui","year":"2015","unstructured":"Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. 2015. StextdollarA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 591--604."},{"key":"e_1_3_2_2_6_1","volume-title":"Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom.","author":"Aranha Diego F.","year":"2020","unstructured":"Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom. 2020. LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. In CCS. ACM, 225--242."},{"key":"e_1_3_2_2_7_1","unstructured":"Asylo Authors. Accessed: 2021. Asylo. https:\/\/asylo.dev\/."},{"key":"e_1_3_2_2_8_1","unstructured":"Daniel J Bernstein. 2005. Cache-timing attacks on AES."},{"key":"e_1_3_2_2_9_1","volume-title":"Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom.","author":"Bernstein Daniel J.","year":"2017","unstructured":"Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom. 2017. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. In CHES (Lecture Notes in Computer Science), Vol. 10529. Springer, 555--576."},{"key":"e_1_3_2_2_10_1","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"Dan Boneh","year":"1999","unstructured":"Dan Boneh et al. 1999. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, Vol. 46, 2 (1999), 203--213.","journal-title":"Notices of the AMS"},{"key":"e_1_3_2_2_11_1","volume-title":"ASIACRYPT (Lecture Notes in Computer Science)","author":"Boneh Dan","unstructured":"Dan Boneh, Glenn Durfee, and Yair Frankel. 1998. An Attack on RSA Given a Small Fraction of the Private Key Bits. In ASIACRYPT (Lecture Notes in Computer Science), Vol. 1514. Springer, 25--34."},{"key":"e_1_3_2_2_12_1","unstructured":"BoringSSL. Accessed: 2020. https:\/\/boringssl.googlesource.com\/boringssl\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Botan: Crypto and TLS for Modern C"},{"key":"e_1_3_2_2_14_1","unstructured":". Accessed: 2020. https:\/\/github.com\/randombit\/botan."},{"key":"e_1_3_2_2_15_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fc ller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), William Enck and Collin Mulliner (Eds.). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser"},{"key":"e_1_3_2_2_16_1","volume-title":"Jos\u00e9 Manuel Moya, and Thomas Eisenbarth.","author":"Briongos Samira","year":"2020","unstructured":"Samira Briongos, Pedro Malag\u00f3 n, Jos\u00e9 Manuel Moya, and Thomas Eisenbarth. 2020. RELOAD"},{"key":"e_1_3_2_2_17_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"REFRESH","unstructured":"REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. In USENIX Security Symposium. USENIX Association, 1967--1984."},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Security Symposium. USENIX Association, 991--1008","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018a. Foreshadow: Extracting the Keys to the Intel\u00ae SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security Symposium. USENIX Association, 991--1008."},{"key":"e_1_3_2_2_19_1","volume-title":"IEEE Symposium on Security and Privacy. IEEE, 54--72","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens. 2020. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In IEEE Symposium on Security and Privacy. IEEE, 54--72."},{"key":"e_1_3_2_2_20_1","first-page":"1","article-title":"SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. In SysTEX@SOSP","volume":"4","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2017. SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. In SysTEX@SOSP. ACM, 4:1--4:6.","journal-title":"ACM"},{"key":"e_1_3_2_2_21_1","volume-title":"Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. In CCS. ACM, 178--195.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2018b. Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. In CCS. ACM, 178--195."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2963021"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900030"},{"key":"e_1_3_2_2_24_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel\u00ae SGX Explained. https:\/\/eprint.iacr.org\/2016\/086.pdf."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.171-191"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756550"},{"key":"e_1_3_2_2_27_1","unstructured":"Enigma. Accessed: 2021 a. Secret Network. https:\/\/scrt.network\/."},{"key":"e_1_3_2_2_28_1","unstructured":"Enigma. Accessed: 2021 b. Secret Network - Deployment. https:\/\/github.com\/enigmampc\/SecretNetwork\/blob\/master\/deployment\/dockerfiles\/base.Dockerfile."},{"key":"e_1_3_2_2_29_1","volume-title":"Certified Side Channels. In USENIX Security Symposium. USENIX Association","author":"Cesar Pereida","year":"2020","unstructured":"Cesar Pereida Garc'i a, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Bob Brumley. 2020. Certified Side Channels. In USENIX Security Symposium. USENIX Association, 2021--2038."},{"key":"e_1_3_2_2_30_1","volume-title":"a low-level cryptographic library. Accessed","author":"Nettle GNU","year":"2020","unstructured":"GNU Nettle: a low-level cryptographic library. Accessed: 2020. https:\/\/git.lysator.liu.se\/nettle\/nettle."},{"key":"e_1_3_2_2_31_1","volume-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium. USENIX Association, 955--972","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security Symposium. USENIX Association, 955--972."},{"key":"e_1_3_2_2_32_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Gruss Daniel","unstructured":"Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+Flush: a fast and stealthy cache attack. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_2_34_1","volume-title":"CRYPTO (Lecture Notes in Computer Science)","author":"Henecka Wilko","unstructured":"Wilko Henecka, Alexander May, and Alexander Meurer. 2010. Correcting Errors in RSA Private Keys. In CRYPTO (Lecture Notes in Computer Science), Vol. 6223. Springer, 351--369."},{"key":"e_1_3_2_2_35_1","volume-title":"CRYPTO (Lecture Notes in Computer Science)","author":"Heninger Nadia","unstructured":"Nadia Heninger and Hovav Shacham. 2009. Reconstructing RSA Private Keys from Random Key Bits. In CRYPTO (Lecture Notes in Computer Science), Vol. 5677. Springer, 1--17."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Matthew Hoekstra Reshma Lal Pradeep Pappachan Vinay Phegade and Juan del Cuvillo. 2013. Using innovative instructions to create trustworthy software solutions. In HASP@ISCA. ACM 11.","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_2_37_1","volume-title":"IMACC (Lecture Notes in Computer Science)","author":"Howgrave-Graham Nick","unstructured":"Nick Howgrave-Graham. 1997. Finding Small Roots of Univariate Modular Equations Revisited. In IMACC (Lecture Notes in Computer Science), Vol. 1355. Springer, 131--142."},{"key":"e_1_3_2_2_38_1","volume-title":"Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar.","author":"Inci Mehmet Sinan","year":"2016","unstructured":"Mehmet Sinan Inci, Berk G\u00fc lmezoglu, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar. 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud. In CHES (Lecture Notes in Computer Science), Vol. 9813. Springer, 368--388."},{"key":"e_1_3_2_2_39_1","unstructured":"Intel. 2018. L1 Terminal Fault. https:\/\/software.intel.com\/security-software-guidance\/deep-dives\/deep-dive-intel-analysis-l1-terminal-fault."},{"key":"e_1_3_2_2_40_1","unstructured":"Intel. 2020. Intel\u00ae Processors Load Value Injection Advisory - INTEL-SA-00334. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00334.html."},{"key":"e_1_3_2_2_41_1","unstructured":"Intel. 2020 Accessed: 2021 b. Load Value Injection. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/software-security-guidance\/technical-documentation\/load-value-injection.html."},{"key":"e_1_3_2_2_42_1","unstructured":"Intel. Accessed: 2021 a. https:\/\/github.com\/intel\/intel-sgx-ssl."},{"key":"e_1_3_2_2_43_1","unstructured":"Intel\u00ae. 2020. Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) SDK for Linux OS - Developer Reference. Revision 2.9."},{"key":"e_1_3_2_2_44_1","unstructured":"ITU. Accessed: 2020. X.680: ASN.1 specification. https:\/\/www.itu.int\/rec\/T-REC-X.680\/en."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"B. Kaliski and EMC. 2008. RFC 5208 - Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2. https:\/\/tools.ietf.org\/html\/rfc5208.","DOI":"10.17487\/rfc5208"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"e_1_3_2_2_47_1","volume-title":"CHES (Lecture Notes in Computer Science)","author":"Kumar Sandeep S.","unstructured":"Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, and Manfred Schimmler. 2006. Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In CHES (Lecture Notes in Computer Science), Vol. 4249. Springer, 101--118."},{"key":"e_1_3_2_2_48_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium. USENIX Association, 557--574","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium. USENIX Association, 557--574."},{"key":"e_1_3_2_2_49_1","unstructured":"libsodium. Accessed: 2021. https:\/\/github.com\/jedisct1\/libsodium\/."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"e_1_3_2_2_51_1","volume-title":"IEEE Symposium on Security and Privacy. IEEE Computer Society, 605--622","author":"Liu Fangfei","unstructured":"Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 605--622."},{"key":"e_1_3_2_2_52_1","unstructured":"Alexander May. 2003. New RSA vulnerabilities using lattice reduction methods. Ph.D. Dissertation. University of Paderborn."},{"key":"e_1_3_2_2_53_1","volume-title":"The LLL Algorithm","author":"May Alexander","unstructured":"Alexander May. 2010. Using LLL-Reduction for Solving RSA and Factorization Problems. In The LLL Algorithm. Springer, 315--348."},{"key":"e_1_3_2_2_54_1","unstructured":"mbed TLS. Accessed: 2021. https:\/\/github.com\/ARMmbed\/mbedtls."},{"key":"e_1_3_2_2_55_1","volume-title":"Savagaonkar","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In HASP@ISCA. ACM, 10."},{"key":"e_1_3_2_2_56_1","unstructured":"Microsoft. Accessed: 2021 a. Cryptography CryptoAPI and CAPICOM. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/seccrypto\/cryptography--cryptoapi--and-capicom."},{"key":"e_1_3_2_2_57_1","unstructured":"Microsoft. Accessed: 2021 b. FIPS 140--2 Validation. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/fips-140-validation."},{"key":"e_1_3_2_2_58_1","volume-title":"CHES (Lecture Notes in Computer Science)","author":"Moghimi Ahmad","unstructured":"Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In CHES (Lecture Notes in Computer Science), Vol. 10529. Springer, 69--90."},{"key":"e_1_3_2_2_59_1","volume-title":"Nadia Heninger, Frank Piessens, and Berk Sunar. 2020 a. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction. CoRR","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020 a. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction. CoRR, Vol. abs\/2002.08437 (2020)."},{"key":"e_1_3_2_2_60_1","volume-title":"USENIX Security Symposium. USENIX Association, 1427--1444","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Moritz Lipp, Berk Sunar, and Michael Schwarz. 2020 b. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. In USENIX Security Symposium. USENIX Association, 1427--1444."},{"key":"e_1_3_2_2_61_1","unstructured":"Nimbus-JOSE-JWT. Accessed: 2021. https:\/\/bitbucket.org\/connect2id\/nimbus-jose-jwt."},{"key":"e_1_3_2_2_62_1","unstructured":"NSS. Accessed: 2020. https:\/\/hg.mozilla.org\/projects\/nss."},{"key":"e_1_3_2_2_63_1","volume-title":"Cryptography and SSL\/TLS Toolkit. Accessed","year":"2021","unstructured":"OpenSSL: Cryptography and SSL\/TLS Toolkit. Accessed: 2021. https:\/\/github.com\/openssl\/openssl."},{"key":"e_1_3_2_2_64_1","volume-title":"Cache Attacks and Countermeasures: The Case of AES","author":"Osvik Dag Arne","unstructured":"Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In CT-RSA. Springer, Berlin, Heidelberg, 1--20."},{"key":"e_1_3_2_2_65_1","volume-title":"Sibborn","author":"Paterson Kenneth G.","year":"2012","unstructured":"Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn. 2012. A Coding-Theoretic Approach to Recovering Noisy RSA Keys. In ASIACRYPT (Lecture Notes in Computer Science), Vol. 7658. Springer, 386--403."},{"key":"e_1_3_2_2_66_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_2_68_1","unstructured":"Rohde & Schwarz Cybersecurity and Hackmanit GmbH. Accessed: 2020. BSI project: Development of a secure crypto library. https:\/\/www.bsi.bund.de\/EN\/Topics\/Crypto\/Cryptography\/CryptoLibrary\/crypto_library_node.html."},{"key":"e_1_3_2_2_69_1","unstructured":"Rust SGX SDK. Accessed: 2021. https:\/\/github.com\/apache\/incubator-teaclave-sgx-sdk."},{"key":"e_1_3_2_2_70_1","unstructured":"Vinnie Scarlata Simon Johnson James Beaney and Piotr Zmijewski. 2018. Supporting third party attestation for Intel\u00ae SGX with Intel\u00ae data center attestation primitives."},{"key":"e_1_3_2_2_71_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss.","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. In CCS. ACM, 753--768."},{"key":"e_1_3_2_2_72_1","volume-title":"CT-RSA (Lecture Notes in Computer Science)","author":"Takayasu Atsushi","unstructured":"Atsushi Takayasu and Noboru Kunihiro. 2017. A Tool Kit for Partial Key Exposure Attacks on RSA. In CT-RSA (Lecture Notes in Computer Science), Vol. 10159. Springer, 58--73."},{"key":"e_1_3_2_2_73_1","volume-title":"Efficient TLS Termination Inside SGX Enclaves for Existing Applications. Accessed","year":"2020","unstructured":"TaLoS: Efficient TLS Termination Inside SGX Enclaves for Existing Applications. Accessed: 2020. https:\/\/github.com\/lsds\/TaLoS."},{"key":"e_1_3_2_2_74_1","volume-title":"Jes\u00fa s-Javier Chi-Dom'i nguez, Alejandro Cabrera Aldaya, and Billy Bob Brumley.","author":"Hassan Sohaibul","year":"2020","unstructured":"Sohaibul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida Garc'i a, Jes\u00fa s-Javier Chi-Dom'i nguez, Alejandro Cabrera Aldaya, and Billy Bob Brumley. 2020. D\u00e9 j\u00e0 Vu: Side-Channel Analysis of Mozilla's NSS. In CCS. ACM, 1887--1902."},{"key":"e_1_3_2_2_75_1","volume-title":"Theory and Practice of Finding Eviction Sets. In IEEE Symposium on Security and Privacy. IEEE, 39--54","author":"Vila Pepe","unstructured":"Pepe Vila, Boris K\u00f6 pf, and Jos\u00e9 F. Morales. 2019. Theory and Practice of Finding Eviction Sets. In IEEE Symposium on Security and Privacy. IEEE, 39--54."},{"key":"e_1_3_2_2_76_1","volume-title":"Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. In USENIX Security Symposium. USENIX Association, 1767--1784","author":"Weiser Samuel","year":"2020","unstructured":"Samuel Weiser, David Schrammel, Lukas Bodner, and Raphael Spreitzer. 2020. Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. In USENIX Security Symposium. USENIX Association, 1767--1784."},{"key":"e_1_3_2_2_77_1","volume-title":"DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. In USENIX Security Symposium. USENIX Association, 603--620","author":"Weiser Samuel","year":"2018","unstructured":"Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, and Georg Sigl. 2018. DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. In USENIX Security Symposium. USENIX Association, 603--620."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"Jan Wichelmann Ahmad Moghimi Thomas Eisenbarth and Berk Sunar. 2018. MicroWalk: A Framework for Finding Side Channels in Binaries. In ACSAC. ACM 161--173.","DOI":"10.1145\/3274694.3274741"},{"key":"e_1_3_2_2_79_1","volume-title":"Embedded TLS Library. Accessed","year":"2021","unstructured":"wolfSSL: Embedded TLS Library. Accessed: 2021. https:\/\/github.com\/wolfSSL\/wolfssl."},{"key":"e_1_3_2_2_80_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 640--656","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 640--656."},{"key":"e_1_3_2_2_81_1","volume-title":"USENIX Security Symposium. USENIX Association, 719--732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium. USENIX Association, 719--732."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0152-y"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"crossref","unstructured":"Yinqian Zhang Ari Juels Michael K. Reiter and Thomas Ristenpart. 2012. Cross-VM side channels and their use to extract private keys. In CCS. ACM 305--316.","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_2_84_1","unstructured":"Intel\u00ae Developer Zone. 2019 Accessed: 2020. Microarchitectural Data Sampling. https:\/\/software.intel.com\/security-software-guidance\/deep-dives\/deep-dive-intel-analysis-microarchitectural-data-sampling."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:01Z","timestamp":1763499121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484783"}},"subtitle":["Exploiting Key Decoding in Cryptographic Libraries"],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":84,"alternative-id":["10.1145\/3460120.3484783","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484783","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}