{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:21Z","timestamp":1750220241528,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545965","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"17-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Metaobjects to Reinforce Data Leakage Attacks"],"prefix":"10.1145","author":[{"given":"Hoyong","family":"Jeong","sequence":"first","affiliation":[{"name":"Graduate School of Information Security, KAIST, South Korea"}]},{"given":"Hodong","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Korea University, South Korea"}]},{"given":"Junbeom","family":"Hur","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Korea University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg\u00a0S. Corrado Andy Davis Jeffrey Dean Matthieu Devin 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/  Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg\u00a0S. Corrado Andy Davis Jeffrey Dean Matthieu Devin 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_2_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo\u00a0Van","year":"2018","unstructured":"Jo\u00a0Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas\u00a0 F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX, Baltimore, MD, USA, 991\u20131008. Jo\u00a0Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security Symposium (USENIX Security 18). USENIX, Baltimore, MD, USA, 991\u20131008."},{"key":"e_1_3_2_1_3_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella , Jo\u00a0Van Bulck , Michael Schwarz , Moritz Lipp , Benjamin\u00a0Von Berg , Philipp Ortner , Frank Piessens , Dmitry Evtyushkin , and Daniel Gruss . 2019 . A systematic evaluation of transient execution attacks and defenses . In 28th USENIX Security Symposium (USENIX Security 19) . 249\u2013266. Claudio Canella, Jo\u00a0Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin\u00a0Von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A systematic evaluation of transient execution attacks and defenses. In 28th USENIX Security Symposium (USENIX Security 19). 249\u2013266."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384747"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_7_1","unstructured":"Fran\u00e7ois Chollet 2015. Keras. https:\/\/keras.io  Fran\u00e7ois Chollet 2015. Keras. https:\/\/keras.io"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium. 321\u2013336","author":"Chow Jim","year":"2004","unstructured":"Jim Chow , Ben Pfaff , Tal Garfinkel , Kevin Christopher , and Mendel Rosenblum . 2004 . Understanding data lifetime via whole system simulation . In USENIX Security Symposium. 321\u2013336 . Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. 2004. Understanding data lifetime via whole system simulation. In USENIX Security Symposium. 321\u2013336."},{"key":"e_1_3_2_1_9_1","unstructured":"Common Weakness\u00a0Enumeration (CWE). 2006. CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer. https:\/\/cwe.mitre.org\/data\/definitions\/212  Common Weakness\u00a0Enumeration (CWE). 2006. CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer. https:\/\/cwe.mitre.org\/data\/definitions\/212"},{"key":"e_1_3_2_1_10_1","unstructured":"Common Weakness\u00a0Enumeration (CWE). 2006. CWE-226: Sensitive Information in Resource Not Removed Before Reuse. https:\/\/cwe.mitre.org\/data\/definitions\/226  Common Weakness\u00a0Enumeration (CWE). 2006. CWE-226: Sensitive Information in Resource Not Removed Before Reuse. https:\/\/cwe.mitre.org\/data\/definitions\/226"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_12_1","unstructured":"ERPScan. 2018. Information disclosure vulnerability archives. https:\/\/erpscan.io\/tag\/information-disclosure-vulnerability\/  ERPScan. 2018. Information disclosure vulnerability archives. https:\/\/erpscan.io\/tag\/information-disclosure-vulnerability\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/114669.114671"},{"key":"e_1_3_2_1_14_1","unstructured":"Brendan Gregg. 2018. KPTI\/KAISER Meltdown Initial Performance Regressions. https:\/\/www.brendangregg.com\/blog\/2018-02-09\/kpti-kaiser-meltdown-performance.html  Brendan Gregg. 2018. KPTI\/KAISER Meltdown Initial Performance Regressions. https:\/\/www.brendangregg.com\/blog\/2018-02-09\/kpti-kaiser-meltdown-performance.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.77"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458721"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_2"},{"key":"e_1_3_2_1_21_1","unstructured":"Insecure.org. 1996. Solaris (and others) ftpd Core Dump Bug. http:\/\/insecure.org\/sploits\/ftpd.pasv  Insecure.org. 1996. Solaris (and others) ftpd Core Dump Bug. http:\/\/insecure.org\/sploits\/ftpd.pasv"},{"key":"e_1_3_2_1_22_1","unstructured":"Insecure.org. 1997. Security Dynamics FTP server core problem. http:\/\/insecure.org\/sploits\/solaris.secdynamics.core  Insecure.org. 1997. Security Dynamics FTP server core problem. http:\/\/insecure.org\/sploits\/solaris.secdynamics.core"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897962"},{"key":"e_1_3_2_1_24_1","first-page":"5","article-title":"La cryptographic militaire","author":"Kerckhoffs Auguste","year":"1883","unstructured":"Auguste Kerckhoffs . 1883 . La cryptographic militaire . Journal des sciences militaires(1883) , 5 \u2013 38 . Auguste Kerckhoffs. 1883. La cryptographic militaire. Journal des sciences militaires(1883), 5\u201338.","journal-title":"Journal des sciences militaires(1883)"},{"key":"e_1_3_2_1_25_1","unstructured":"Vadim Kolontsov. 1997. WU-FTPD core dump vulnerability (the old patch doesn\u2019t work). https:\/\/insecure.org\/sploits\/ftp.coredump2  Vadim Kolontsov. 1997. WU-FTPD core dump vulnerability (the old patch doesn\u2019t work). https:\/\/insecure.org\/sploits\/ftp.coredump2"},{"key":"e_1_3_2_1_26_1","unstructured":"Michael Larabel. 2017. Linux 4.12 To Enable KASLR By Default. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=KASLR-Default-Linux-4.12  Michael Larabel. 2017. Linux 4.12 To Enable KASLR By Default. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=KASLR-Default-Linux-4.12"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295739"},{"key":"e_1_3_2_1_28_1","unstructured":"LinuxReviews. 2019. The Combined Performance Penalty of Intel CPU bugs Zombieload Meltdown Spectre and L1TF. https:\/\/linuxreviews.org\/The_Combined_Performance_Penalty_of_Intel_CPU_bugs_Zombieload _Meltdown _Spectre_and_L1TF  LinuxReviews. 2019. The Combined Performance Penalty of Intel CPU bugs Zombieload Meltdown Spectre and L1TF. https:\/\/linuxreviews.org\/The_Combined_Performance_Penalty_of_Intel_CPU_bugs_Zombieload _Meltdown _Spectre_and_L1TF"},{"key":"e_1_3_2_1_29_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , 2018 . Meltdown: Reading kernel memory from user space . In 27th USENIX Security Symposium (USENIX Security 18) . 973\u2013990. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, 2018. Meltdown: Reading kernel memory from user space. In 27th USENIX Security Symposium (USENIX Security 18). 973\u2013990."},{"key":"e_1_3_2_1_30_1","volume-title":"Cryptographic key recovery from linux memory dumps. Chaos Communication Camp 2007","author":"Pettersson Torbj\u00f6rn","year":"2007","unstructured":"Torbj\u00f6rn Pettersson . 2007. Cryptographic key recovery from linux memory dumps. Chaos Communication Camp 2007 ( 2007 ). Torbj\u00f6rn Pettersson. 2007. Cryptographic key recovery from linux memory dumps. Chaos Communication Camp 2007 (2007)."},{"volume-title":"Measuring the impact of spectre and meltdown. In 2018 IEEE High Performance extreme Computing Conference (HPEC)","author":"Prout Andrew","key":"e_1_3_2_1_31_1","unstructured":"Andrew Prout , William Arcand , David Bestor , Bill Bergeron , Chansup Byun , Vijay Gadepally , Michael Houle , Matthew Hubbell , Michael Jones , Anna Klein , and others.2018. Measuring the impact of spectre and meltdown. In 2018 IEEE High Performance extreme Computing Conference (HPEC) . IEEE , 1\u20135. Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, and others.2018. Measuring the impact of spectre and meltdown. In 2018 IEEE High Performance extreme Computing Conference (HPEC). IEEE, 1\u20135."},{"key":"e_1_3_2_1_32_1","unstructured":"PyCrypto. 2013. PyCrypto - The Python Cryptography Toolkit. http:\/\/www.pycrypto.org\/  PyCrypto. 2013. PyCrypto - The Python Cryptography Toolkit. http:\/\/www.pycrypto.org\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"volume-title":"Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications (Portland, Oregon, USA) (OOPSLA \u201906)","author":"Rigo Armin","key":"e_1_3_2_1_34_1","unstructured":"Armin Rigo and Samuele Pedroni . 2006. PyPy\u2019s Approach to Virtual Machine Construction . In Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications (Portland, Oregon, USA) (OOPSLA \u201906) . Association for Computing Machinery , New York, NY, USA , 944\u2013953. https:\/\/doi.org\/10.1145\/1176617.1176753 10.1145\/1176617.1176753 Armin Rigo and Samuele Pedroni. 2006. PyPy\u2019s Approach to Virtual Machine Construction. In Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications (Portland, Oregon, USA) (OOPSLA \u201906). Association for Computing Machinery, New York, NY, USA, 944\u2013953. https:\/\/doi.org\/10.1145\/1176617.1176753"},{"key":"e_1_3_2_1_35_1","unstructured":"Stephan\u00a0Van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX fails in practice. (2020). unpublished.  Stephan\u00a0Van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX fails in practice. (2020). unpublished."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00064"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_39_1","unstructured":"Nikolay\u00a0A. Simakov Martins\u00a0D. Innus Matthew\u00a0D. Jones Joseph\u00a0P. White Steven\u00a0M. Gallo Robert\u00a0L. DeLeon and Thomas\u00a0R. Furlani. 2018. Effect of Meltdown and Spectre Patches on the Performance of HPC Applications. arxiv:1801.04329\u00a0[cs.PF]  Nikolay\u00a0A. Simakov Martins\u00a0D. Innus Matthew\u00a0D. Jones Joseph\u00a0P. White Steven\u00a0M. Gallo Robert\u00a0L. DeLeon and Thomas\u00a0R. Furlani. 2018. Effect of Meltdown and Spectre Patches on the Performance of HPC Applications. arxiv:1801.04329\u00a0[cs.PF]"},{"key":"e_1_3_2_1_40_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. arxiv:1409.1556\u00a0[cs.CV]  Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. arxiv:1409.1556\u00a0[cs.CV]"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/800017.800513"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_43_1","unstructured":"Victor Stinner. 2016. Python 3.6 dict becomes compact and gets a private version; and keywords become ordered. https:\/\/mail.python.org\/pipermail\/python-dev\/2016-September\/146327.html  Victor Stinner. 2016. Python 3.6 dict becomes compact and gets a private version; and keywords become ordered. https:\/\/mail.python.org\/pipermail\/python-dev\/2016-September\/146327.html"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_3_2_1_45_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2004. CVE-2004-2331. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2004-2331  Common Vulnerabilities and Exposures (CVE). 2004. CVE-2004-2331. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2004-2331"},{"key":"e_1_3_2_1_46_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2005. CVE-2005-0530. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2005-0530  Common Vulnerabilities and Exposures (CVE). 2005. CVE-2005-0530. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2005-0530"},{"key":"e_1_3_2_1_47_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2012. CVE-2012-3174. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-3174  Common Vulnerabilities and Exposures (CVE). 2012. CVE-2012-3174. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-3174"},{"key":"e_1_3_2_1_48_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2012. CVE-2012-4681. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-4681  Common Vulnerabilities and Exposures (CVE). 2012. CVE-2012-4681. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-4681"},{"key":"e_1_3_2_1_49_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2013. CVE-2013-0422. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-0422  Common Vulnerabilities and Exposures (CVE). 2013. CVE-2013-0422. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-0422"},{"key":"e_1_3_2_1_50_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-0069. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0069  Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-0069. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0069"},{"key":"e_1_3_2_1_51_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-0160. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0160  Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-0160. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0160"},{"key":"e_1_3_2_1_52_1","unstructured":"Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-4653. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-4653  Common Vulnerabilities and Exposures (CVE). 2014. CVE-2014-4653. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-4653"},{"key":"e_1_3_2_1_53_1","unstructured":"Ofir Weisse Jo\u00a0Van Bulck Marina Minkin Daniel Genkin Baris Kasikci Frank Piessens Mark Silberstein Raoul Strackx Thomas\u00a0F. Wenisch and Yuval Yarom. 2018. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution. (2018). unpublished.  Ofir Weisse Jo\u00a0Van Bulck Marina Minkin Daniel Genkin Baris Kasikci Frank Piessens Mark Silberstein Raoul Strackx Thomas\u00a0F. Wenisch and Yuval Yarom. 2018. Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution. (2018). unpublished."},{"key":"e_1_3_2_1_54_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack . In 23rd USENIX Security Symposium (USENIX Security 14) . 719\u2013732. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium (USENIX Security 14). 719\u2013732."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":55,"alternative-id":["10.1145\/3545948.3545965","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545965","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}