{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:47:23Z","timestamp":1756993643350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1947913"],"award-info":[{"award-number":["CNS-1947913"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511500","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"252-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cache Shaping"],"prefix":"10.1145","author":[{"given":"Haipeng","family":"Li","sequence":"first","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"REFERENCES [1] [n.d.]. Cache Shaping Defense. https:\/\/github.com\/UCdasec\/CacheShaping  REFERENCES [1] [n.d.]. Cache Shaping Defense. https:\/\/github.com\/UCdasec\/CacheShaping"},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Mozilla Foundation. Security advisory 2018-01. https:\/\/www.mozilla.org\/ en-US\/security\/advisories\/mfsa2018-01\/  [n.d.]. Mozilla Foundation. Security advisory 2018-01. https:\/\/www.mozilla.org\/ en-US\/security\/advisories\/mfsa2018-01\/"},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. NNI: An open source AutoML toolkit for neural architecture search and hyper-parameter tuning. https:\/\/github.com\/Microsoft\/nni  [n.d.]. NNI: An open source AutoML toolkit for neural architecture search and hyper-parameter tuning. https:\/\/github.com\/Microsoft\/nni"},{"key":"e_1_3_2_2_4_1","unstructured":"[n.d.]. Selenium automates browsers. https:\/\/www.selenium.dev\/  [n.d.]. Selenium automates browsers. https:\/\/www.selenium.dev\/"},{"volume-title":"SPEC CPU 2017 Benchmarks. https:\/\/www.spec.org\/cpu2017\/","key":"e_1_3_2_2_5_1","unstructured":"[n.d.]. SPEC CPU 2017 Benchmarks. https:\/\/www.spec.org\/cpu2017\/ [n.d.]. SPEC CPU 2017 Benchmarks. https:\/\/www.spec.org\/cpu2017\/"},{"key":"e_1_3_2_2_6_1","volume-title":"Not So Incognito: Exploiting Resource-Based Side Channels in JavaScript Engines. Bachelor's thesis","author":"Booth Jo.","year":"2015","unstructured":"Jo. Booth . 2015. Not So Incognito: Exploiting Resource-Based Side Channels in JavaScript Engines. Bachelor's thesis , Harvard College ( 2015 ). Jo. Booth. 2015. Not So Incognito: Exploiting Resource-Based Side Channels in JavaScript Engines. Bachelor's thesis, Harvard College (2015)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196501"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485902"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI51335.2021.00044"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_2_13_1","volume-title":"Proc. of USENIX Security'20","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang . 2020 . Zero-delay Lightweight Defenses against Website Fingerprinting . In Proc. of USENIX Security'20 . Jiajun Gong and Tao Wang. 2020. Zero-delay Lightweight Defenses against Website Fingerprinting. In Proc. of USENIX Security'20."},{"volume-title":"Proc. of USENIX Security'16","author":"Hayes J.","key":"e_1_3_2_2_14_1","unstructured":"J. Hayes and G. Danezis . 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique . In Proc. of USENIX Security'16 . J. Hayes and G. Danezis. 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proc. of USENIX Security'16."},{"key":"e_1_3_2_2_15_1","volume-title":"Proc. of ACM Workshop on Cloud Computing Security.","author":"Hermann Dominik","year":"2009","unstructured":"Dominik Hermann , Rolf Wendolsky , and Hannes Federrath . 2009 . Website Fingertinging: Attacking Popular Privacy Enhancing Tehnologies with the Multinomial Naive-Bayes Classifier . In Proc. of ACM Workshop on Cloud Computing Security. Dominik Hermann, Rolf Wendolsky, and Hannes Federrath. 2009. Website Fingertinging: Attacking Popular Privacy Enhancing Tehnologies with the Multinomial Naive-Bayes Classifier. In Proc. of ACM Workshop on Cloud Computing Security."},{"volume-title":"Proc. of ESORICS'16","author":"Juarez M.","key":"e_1_3_2_2_16_1","unstructured":"M. Juarez , M. Imani , M. Perry , C. Diaz , and M. Wright . 2016. Toward an Efficient Website Fingerprinting Defense . In Proc. of ESORICS'16 . M. Juarez, M. Imani, M. Perry, C. Diaz, and M. Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In Proc. of ESORICS'16."},{"volume-title":"Proc. of IEEE S&P'20","author":"Kurth M.","key":"e_1_3_2_2_17_1","unstructured":"M. Kurth , B. Gras , D. Andriesse , C. Giuffrida , H. Bos , and K. Razavi . 2020. NetCAT: Practical Cache Attacks from the Network . In Proc. of IEEE S&P'20 . M. Kurth, B. Gras, D. Andriesse, C. Giuffrida, H. Bos, and K. Razavi. 2020. NetCAT: Practical Cache Attacks from the Network. In Proc. of IEEE S&P'20."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_15"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"volume-title":"Proc. of 3rd IEEE Real-Time Technology and Applications Symposium.","author":"Liedtke J.","key":"e_1_3_2_2_20_1","unstructured":"J. Liedtke , H. Hartig , and M. Hohmuth . 1997. OS-controlled cache predictability for real-time systems . In Proc. of 3rd IEEE Real-Time Technology and Applications Symposium. J. Liedtke, H. Hartig, and M. Hohmuth. 1997. OS-controlled cache predictability for real-time systems. In Proc. of 3rd IEEE Real-Time Technology and Applications Symposium."},{"volume-title":"Proc. of 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'14)","author":"Liu F.","key":"e_1_3_2_2_21_1","unstructured":"F. Liu and R. B. Lee . 2014. Random Fill Cache Architecture . In Proc. of 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'14) . F. Liu and R. B. Lee. 2014. Random Fill Cache Architecture. In Proc. of 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO'14)."},{"volume-title":"2018 Global Information Infrastructure and Networking Symposium (GIIS).","author":"Mushtaq M.","key":"e_1_3_2_2_22_1","unstructured":"M. Mushtaq , A. Akram , M. K. Bhatti , R. N. B. Rais , V. Lapotre , and G. Gogniat . 2018. Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm . In 2018 Global Information Infrastructure and Networking Symposium (GIIS). M. Mushtaq, A. Akram, M. K. Bhatti, R. N. B. Rais, V. Lapotre, and G. Gogniat. 2018. Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm. In 2018 Global Information Infrastructure and Networking Symposium (GIIS)."},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. of USENIX Security'21","author":"Nasr Milad","year":"2020","unstructured":"Milad Nasr , Alireza Bahramali , and Amir Houmansadr . 2020 . Defeating DNNBased Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations . In Proc. of USENIX Security'21 . Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2020. Defeating DNNBased Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In Proc. of USENIX Security'21."},{"volume-title":"Proc. of Privacy Enhancing Technologies (PETS'19)","author":"Oh Se Eun","key":"e_1_3_2_2_24_1","unstructured":"Se Eun Oh , S. Sunkam , and N. Hopper . 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints . In Proc. of Privacy Enhancing Technologies (PETS'19) . Se Eun Oh, S. Sunkam, and N. Hopper. 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints. In Proc. of Privacy Enhancing Technologies (PETS'19)."},{"key":"e_1_3_2_2_25_1","volume-title":"Keromytis","author":"Oren Yossef","year":"2015","unstructured":"Yossef Oren , Vasileios P. Kemerlis , Simha Sethumadhavan , and Angelos D . Keromytis . 2015 . The Spy in the Sandbox : Practical Cache Attacks in JavaScript and Their Implications. In in Proc. of ACM CCS '15. Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, and Angelos D. Keromytis. 2015. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and Their Implications. In in Proc. of ACM CCS'15."},{"key":"e_1_3_2_2_26_1","volume-title":"Cache Attacks and Countermeasures: The Case of AES. In topics in Cryptology -- CT-RSA","author":"Osvik Dag Arne","year":"2006","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006. Cache Attacks and Countermeasures: The Case of AES. In topics in Cryptology -- CT-RSA 2006 . Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In topics in Cryptology -- CT-RSA 2006."},{"volume-title":"Proc. of NDSS'16","author":"Panchenko A.","key":"e_1_3_2_2_27_1","unstructured":"A. Panchenko , F. Lanze , A. Zinnen , M. Henze , J. Penekamp , K. Wehrle , and T. Engel . 2016. Website Fingerprinting at Internet Scale . In Proc. of NDSS'16 . A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Penekamp, K. Wehrle, and T. Engel. 2016. Website Fingerprinting at Internet Scale. In Proc. of NDSS'16."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"volume-title":"Proc. of NDSS'18","author":"Rimmer V.","key":"e_1_3_2_2_31_1","unstructured":"V. Rimmer , D. Preuveneers , M. Juarez , T. V. Goethem , and W. Joosen . 2018. Automated Website Fingerprinting through Deep Learning . In Proc. of NDSS'18 . V. Rimmer, D. Preuveneers, M. Juarez, T. V. Goethem, and W. Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In Proc. of NDSS'18."},{"volume-title":"Proc. of NDSS'18","author":"Schwarz M.","key":"e_1_3_2_2_32_1","unstructured":"M. Schwarz , Moritz Lipp , and D. Gruss . 2018. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks . In Proc. of NDSS'18 . M. Schwarz, Moritz Lipp, and D. Gruss. 2018. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In Proc. of NDSS'18."},{"volume-title":"Proc. of the 14th ACM Workshop on Artificial Intelligence and Security (AISec'21)","author":"Shan Shawn","key":"e_1_3_2_2_33_1","unstructured":"Shawn Shan , Arjun Nitin Bhagoji , Haitao Zheng , and Ben Y. Zhao . 2021. A Real-time Defense against Website Fingerprinting Attacks . In Proc. of the 14th ACM Workshop on Artificial Intelligence and Security (AISec'21) . Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y. Zhao. 2021. A Real-time Defense against Website Fingerprinting Attacks. In Proc. of the 14th ACM Workshop on Artificial Intelligence and Security (AISec'21)."},{"key":"e_1_3_2_2_34_1","first-page":"2042","article-title":"Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality","volume":"18","author":"Shusterman A.","year":"2020","unstructured":"A. Shusterman , Z. Avraham , E. Croitoru , Y. Haskal , L. Kang , D. Levi , Y. Meltser , P. Mittal , Y. Oren , and Y. Yarom . 2020 . Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality . IEEE Transactions on Dependable and Secure Computing 18 (2020), 2042 -- 2060 . A. Shusterman, Z. Avraham, E. Croitoru, Y. Haskal, L. Kang, D. Levi, Y. Meltser, P. Mittal, Y. Oren, and Y. Yarom. 2020. Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. IEEE Transactions on Dependable and Secure Computing 18 (2020), 2042--2060.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"volume-title":"Proc. of USENIX Security'19","author":"Shusterman A.","key":"e_1_3_2_2_35_1","unstructured":"A. Shusterman , L. Kang , Y. Haskal , Y. Meltser , P. Mittal , Y. Oren , and Y. Yarom . 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel . In Proc. of USENIX Security'19 . A. Shusterman, L. Kang, Y. Haskal, Y. Meltser, P. Mittal, Y. Oren, and Y. Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In Proc. of USENIX Security'19."},{"volume-title":"Proc. of ACM CCS'18","author":"Sirinam P.","key":"e_1_3_2_2_36_1","unstructured":"P. Sirinam , M. Imani , M. Juarez , and M. Wright . 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning . In Proc. of ACM CCS'18 . P. Sirinam, M. Imani, M. Juarez, and M. Wright. 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning. In Proc. of ACM CCS'18."},{"volume-title":"Proc. of ACM CCS'19","author":"Sirinam P.","key":"e_1_3_2_2_37_1","unstructured":"P. Sirinam , N. Mathews , M. S. Rahman , and M. Wright . 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning . In Proc. of ACM CCS'19 . P. Sirinam, N. Mathews, M. S. Rahman, and M. Wright. 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. In Proc. of ACM CCS'19."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0017"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447835"},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. of USENIX Security'14","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cui , Rishab Nithyannand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks on Proable Denfenses for Website Fingerprinting . In Proc. of USENIX Security'14 . Tao Wang, Xiang Cui, Rishab Nithyannand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks on Proable Denfenses for Website Fingerprinting. In Proc. of USENIX Security'14."},{"volume-title":"Proc. of USENIX Security'17","author":"Wang T.","key":"e_1_3_2_2_41_1","unstructured":"T. Wang and I. Goldberg . 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks . In Proc. of USENIX Security'17 . T. Wang and I. Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proc. of USENIX Security'17."},{"volume-title":"Proc. of the 34th annual international symposium on Computer architecture (ISCA'07)","author":"Wang Zhenghong","key":"e_1_3_2_2_42_1","unstructured":"Zhenghong Wang and Ruby B. Lee . 2007. New Cache Designs for Thwarting Software Cache-Based Side Channel Attacks . In Proc. of the 34th annual international symposium on Computer architecture (ISCA'07) . Zhenghong Wang and Ruby B. Lee. 2007. New Cache Designs for Thwarting Software Cache-Based Side Channel Attacks. In Proc. of the 34th annual international symposium on Computer architecture (ISCA'07)."},{"key":"e_1_3_2_2_43_1","unstructured":"Yuval Yarom. [n.d.]. Mastik: A micro-architectural side-channel toolkit. ([n. d.]). https:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/Mastik.pd  Yuval Yarom. [n.d.]. Mastik: A micro-architectural side-channel toolkit. ([n. d.]). https:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/Mastik.pd"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511500"}},"subtitle":["An Effective Defense Against Cache-Based Website Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":43,"alternative-id":["10.1145\/3508398.3511500","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511500","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}