{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:09:41Z","timestamp":1770278981523,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560672","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1583-1597","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Cache Refinement Type for Side-Channel Detection of Cryptographic Software"],"prefix":"10.1145","author":[{"given":"Ke","family":"Jiang","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Yuyan","family":"Bao","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Zhibo","family":"Liu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Tianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23513"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417268"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00078"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535847"},{"key":"e_1_3_2_1_7_1","volume-title":"Nigel P Smart, and Yuval Yarom","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger , Joop van de Pol , Nigel P Smart, and Yuval Yarom . 2014 . ?Ooh Aah... Just a Little Bit?: a small amount of side channel can go a long way. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer , 75--92. Naomi Benger, Joop van de Pol, Nigel P Smart, and Yuval Yarom. 2014. ?Ooh Aah... Just a Little Bit?: a small amount of side channel can go a long way. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 75--92."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890028.1890031"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1707801.1706350"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_11"},{"key":"e_1_3_2_1_12_1","volume-title":"SODA","volume":"1997","author":"Boneh Dan","year":"1997","unstructured":"Dan Boneh and Ramarathnam Venkatesan . 1997 . Rounding in Lattices and its Cryptographic Applications .. In SODA , Vol. 1997 . Citeseer, 675--681. Dan Boneh and Ramarathnam Venkatesan. 1997. Rounding in Lattices and its Cryptographic Applications.. In SODA, Vol. 1997. Citeseer, 675--681."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00022"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234418"},{"key":"e_1_3_2_1_16_1","volume-title":"Quantifying information leakage in cache attacks via symbolic execution. TECS","author":"Chattopadhyay Sudipta","year":"2019","unstructured":"Sudipta Chattopadhyay , Moritz Beck , Ahmed Rezine , and Andreas Zeller . 2019. Quantifying information leakage in cache attacks via symbolic execution. TECS ( 2019 ). Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, and Andreas Zeller. 2019. Quantifying information leakage in cache attacks via symbolic execution. TECS (2019)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_18_1","volume-title":"Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 238--252","author":"Cousot P.","unstructured":"P. Cousot and R. Cousot . 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints . In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 238--252 . P. Cousot and R. Cousot. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 238--252."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00074"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_1_21_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris Kopf , Laurent Mauborgne , and Jan Reineke . 2013 . $$CacheAudit$$: A Tool for the Static Analysis of Cache Side Channels . In 22nd USENIX Security Symposium (USENIX Security 13) . 431--446. Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, and Jan Reineke. 2013. $$CacheAudit$$: A Tool for the Static Analysis of Cache Side Channels. In 22nd USENIX Security Symposium (USENIX Security 13). 431--446."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062388"},{"key":"e_1_3_2_1_23_1","unstructured":"In\u00e8s Ben El Ouahma Quentin L Meunier Karine Heydemann and Emmanuelle Encrenaz. 2017. Symbolic approach for side-channel resistance analysis of masked assembly codes. In Security Proofs for Embedded Systems.  In\u00e8s Ben El Ouahma Quentin L Meunier Karine Heydemann and Emmanuelle Encrenaz. 2017. Symbolic approach for side-channel resistance analysis of masked assembly codes. In Security Proofs for Embedded Systems."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685616"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593193"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17462-0_9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330392"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_30_1","first-page":"3","article-title":"Refinement Types","volume":"6","author":"Jhala Ranjit","year":"2021","unstructured":"Ranjit Jhala , Niki Vazou , 2021 . Refinement Types : A Tutorial. Foundations and Trends in Programming Languages , Vol. 6 , 3 -- 4 (2021), 159--317. Ranjit Jhala, Niki Vazou, et al. 2021. Refinement Types: A Tutorial. Foundations and Trends in Programming Languages, Vol. 6, 3--4 (2021), 159--317.","journal-title":"A Tutorial. Foundations and Trends in Programming Languages"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Ke Jiang Yuyan Bao Shuai Wang Zhibo Liu and Tianwei Zhang. 2022. Cache Refinement Type for Side-Channel Detection of Cryptographic Software. In arXiv preprint arXiv:2209.04610.  Ke Jiang Yuyan Bao Shuai Wang Zhibo Liu and Tianwei Zhang. 2022. Cache Refinement Type for Side-Channel Detection of Cryptographic Software. In arXiv preprint arXiv:2209.04610.","DOI":"10.1145\/3548606.3560672"},{"key":"e_1_3_2_1_32_1","volume-title":"Annual international cryptology conference","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential power analysis . In Annual international cryptology conference . Springer , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388--397."},{"key":"e_1_3_2_1_33_1","unstructured":"Libressl-1f6b35b. 2019. Remove the blinding later to avoid leaking information on the length. https:\/\/github.com\/libressl-portable\/openbsd\/commit\/1f6b35b  Libressl-1f6b35b. 2019. Remove the blinding later to avoid leaking information on the length. https:\/\/github.com\/libressl-portable\/openbsd\/commit\/1f6b35b"},{"key":"e_1_3_2_1_34_1","unstructured":"Libressl-2cd28f9. 2018. Use a blinding value when generating a DSA signature. https:\/\/github.com\/libressl-portable\/openbsd\/commit\/2cd28f9?diff=unified  Libressl-2cd28f9. 2018. Use a blinding value when generating a DSA signature. https:\/\/github.com\/libressl-portable\/openbsd\/commit\/2cd28f9?diff=unified"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456629"},{"key":"e_1_3_2_1_37_1","volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk , Robert Cohn , Robert Muth , Harish Patil , Artur Klauser , Geoff Lowney , Steven Wallace , Vijay Janapa Reddi, and Kim Hazelwood . 2005 . Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices, Vol. 40 , 6 (2005), 190--200. Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices, Vol. 40, 6 (2005), 190--200."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Leonardo De Moura and Nikolaj Bj\u00f8rner. 2008. Z3: an efficient SMT solver (TACAS).  Leonardo De Moura and Nikolaj Bj\u00f8rner. 2008. Z3: an efficient SMT solver (TACAS).","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0021-3"},{"key":"e_1_3_2_1_41_1","volume-title":"The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography","author":"Nguyen Phong Q","year":"2003","unstructured":"Phong Q Nguyen and Igor E Shparlinski . 2003. The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography , Vol. 30 , 2 ( 2003 ), 201--217. Phong Q Nguyen and Igor E Shparlinski. 2003. The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography , Vol. 30, 2 (2003), 201--217."},{"key":"e_1_3_2_1_42_1","unstructured":"OpenSSL-2198be3. 2014. Fix for CVE-2014-0076. https:\/\/github.com\/openssl\/openssl\/commit\/2198be3483259de374f91e57d247d0fc667aef29  OpenSSL-2198be3. 2014. Fix for CVE-2014-0076. https:\/\/github.com\/openssl\/openssl\/commit\/2198be3483259de374f91e57d247d0fc667aef29"},{"key":"e_1_3_2_1_43_1","unstructured":"OpenSSL-4b7a4ba. 2014. Fix for CVE-2014-0076. https:\/\/github.com\/openssl\/openssl\/commit\/4b7a4ba29cafa432fc4266fe6e59e60bc1c96332  OpenSSL-4b7a4ba. 2014. Fix for CVE-2014-0076. https:\/\/github.com\/openssl\/openssl\/commit\/4b7a4ba29cafa432fc4266fe6e59e60bc1c96332"},{"key":"e_1_3_2_1_44_1","unstructured":"OpenSSL-972c87d. 2018. Make bn_num_bits_word constant-time. https:\/\/github.com\/openssl\/openssl\/commit\/972c87dfc7e765bd28a4964519c362f0d3a58ca4  OpenSSL-972c87d. 2018. Make bn_num_bits_word constant-time. https:\/\/github.com\/openssl\/openssl\/commit\/972c87dfc7e765bd28a4964519c362f0d3a58ca4"},{"key":"e_1_3_2_1_45_1","volume-title":"Cryptographers' track at the RSA conference","author":"Osvik Dag Arne","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006. Cache attacks and countermeasures: the case of AES . In Cryptographers' track at the RSA conference . Springer , 1--20. Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of AES. In Cryptographers' track at the RSA conference. Springer, 1--20."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3008852"},{"key":"e_1_3_2_1_47_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit.  Colin Percival. 2005. Cache missing for fun and profit."},{"key":"e_1_3_2_1_48_1","volume-title":"Types and programming languages","author":"Pierce Benjamin C","unstructured":"Benjamin C Pierce . 2002. Types and programming languages . MIT press . Benjamin C Pierce. 2002. Types and programming languages. MIT press."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00011"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_1_51_1","volume-title":"Return of the Hidden Number Problem. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Ryan Keegan","year":"2019","unstructured":"Keegan Ryan . 2019. Return of the Hidden Number Problem. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2019 ), 146--168. Keegan Ryan. 2019. Return of the Hidden Number Problem. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 146--168."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_12"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00009"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00050"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Chungha Sung Brandon Paulsen and Chao Wang. 2018. CANAL: a cache timing analysis framework via LLVM transformation (ASE).  Chungha Sung Brandon Paulsen and Chao Wang. 2018. CANAL: a cache timing analysis framework via LLVM transformation (ASE).","DOI":"10.1145\/3238147.3240485"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44914-8_25"},{"key":"e_1_3_2_1_58_1","volume-title":"Peyton Jones","author":"Vazou Niki","year":"2014","unstructured":"Niki Vazou , Eric L. Seidel , Ranjit Jhala , Dimitrios Vytiniotis , and Simon L . Peyton Jones . 2014 . Refinement types for Haskell. In ICFP. ACM , 269--282. https:\/\/doi.org\/10.1145\/2628136.2628161 10.1145\/2628136.2628161 Niki Vazou, Eric L. Seidel, Ranjit Jhala, Dimitrios Vytiniotis, and Simon L. Peyton Jones. 2014. Refinement types for Haskell. In ICFP. ACM, 269--282. https:\/\/doi.org\/10.1145\/2628136.2628161"},{"key":"#cr-split#-e_1_3_2_1_59_1.1","doi-asserted-by":"crossref","unstructured":"Panagiotis Vekris Benjamin Cosman and Ranjit Jhala. 2016. Refinement types for TypeScript. In PLDI. ACM 310--325. https:\/\/doi.org\/10.1145\/2908080.2908110 10.1145\/2908080.2908110","DOI":"10.1145\/2980983.2908110"},{"key":"#cr-split#-e_1_3_2_1_59_1.2","doi-asserted-by":"crossref","unstructured":"Panagiotis Vekris Benjamin Cosman and Ranjit Jhala. 2016. Refinement types for TypeScript. In PLDI. ACM 310--325. https:\/\/doi.org\/10.1145\/2908080.2908110","DOI":"10.1145\/2980983.2908110"},{"key":"e_1_3_2_1_60_1","volume-title":"28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19). 657--674.","author":"Wang Shuai","unstructured":"Shuai Wang , Yuyan Bao , Xiao Liu , Pei Wang , Danfeng Zhang , and Dinghao Wu. 2019a. Identifying cache-based side channels through secret-augmented abstract interpretation . In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19). 657--674. Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019a. Identifying cache-based side channels through secret-augmented abstract interpretation. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19). 657--674."},{"key":"e_1_3_2_1_61_1","volume-title":"Cached: Identifying cache-based timing channels in production software. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 235--252.","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang , Pei Wang , Xiao Liu , Danfeng Zhang , and Dinghao Wu . 2017 . Cached: Identifying cache-based timing channels in production software. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 235--252. Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. Cached: Identifying cache-based timing channels in production software. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 235--252."},{"key":"e_1_3_2_1_62_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Wubing","year":"2019","unstructured":"Wubing Wang , Yinqian Zhang , and Zhiqiang Lin . 2019 b. Time and Order: Towards Automatically Identifying $$Side-Channel$$ Vulnerabilities in Enclave Binaries . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 443--457. Wubing Wang, Yinqian Zhang, and Zhiqiang Lin. 2019b. Time and Order: Towards Automatically Identifying $$Side-Channel$$ Vulnerabilities in Enclave Binaries. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 443--457."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_3_2_1_65_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Weiser Samuel","year":"2020","unstructured":"Samuel Weiser , David Schrammel , Lukas Bodner , and Raphael Spreitzer . 2020 . Big Numbers-Big Troubles: Systematically Analyzing Nonce Leakage in ($$EC) DSA$$ Implementations . In 29th USENIX Security Symposium (USENIX Security 20) . 1767--1784. Samuel Weiser, David Schrammel, Lukas Bodner, and Raphael Spreitzer. 2020. Big Numbers-Big Troubles: Systematically Analyzing Nonce Leakage in ($$EC) DSA$$ Implementations. In 29th USENIX Security Symposium (USENIX Security 20). 1767--1784."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196524"},{"key":"e_1_3_2_1_67_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Weiser Samuel","year":"2018","unstructured":"Samuel Weiser , Andreas Zankl , Raphael Spreitzer , Katja Miller , Stefan Mangard , and Georg Sigl . 2018 b. $$DATA$$--Differential Address Trace Analysis: Finding Address-based $$Side-Channels$$ in Binaries . In 27th USENIX Security Symposium (USENIX Security 18) . 603--620. Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, and Georg Sigl. 2018b. $$DATA$$--Differential Address Trace Analysis: Finding Address-based $$Side-Channels$$ in Binaries. In 27th USENIX Security Symposium (USENIX Security 18). 603--620."},{"key":"e_1_3_2_1_68_1","volume-title":"USENIX Security Symposium.","author":"Werner Mario","year":"2019","unstructured":"Mario Werner , Thomas Unterluggauer , Lukas Giner , Michael Schwarz , Daniel Gruss , and Stefan Mangard . 2019 . Scattercache: Thwarting cache attacks via cache set randomization . In USENIX Security Symposium. Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, and Stefan Mangard. 2019. Scattercache: Thwarting cache attacks via cache set randomization. In USENIX Security Symposium."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Jan Wichelmann Ahmad Moghimi Thomas Eisenbarth and Berk Sunar. 2018. MicroWalk: A Framework for Finding Side Channels in Binaries. In ACSAC.  Jan Wichelmann Ahmad Moghimi Thomas Eisenbarth and Berk Sunar. 2018. MicroWalk: A Framework for Finding Side Channels in Binaries. In ACSAC.","DOI":"10.1145\/3274694.3274741"},{"key":"e_1_3_2_1_70_1","first-page":"140","article-title":"Recovering OpenSSL ECDSA Nonces Using the FLUSH RELOAD Cache Side-channel Attack","volume":"2014","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Naomi Benger . 2014 . Recovering OpenSSL ECDSA Nonces Using the FLUSH RELOAD Cache Side-channel Attack . IACR Cryptol. ePrint Arch. , Vol. 2014 (2014), 140 . Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA Nonces Using the FLUSH RELOAD Cache Side-channel Attack. IACR Cryptol. ePrint Arch. , Vol. 2014 (2014), 140.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_71_1","volume-title":"FLUSH RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 719--732.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 719--732. Yuval Yarom and Katrina Falkner. 2014. FLUSH RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 719--732."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254078"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_12"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":75,"alternative-id":["10.1145\/3548606.3560672","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560672","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}