{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:24:44Z","timestamp":1773786284370,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3568002","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"978-988","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0849-8651","authenticated-orcid":false,"given":"Fan","family":"Lang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1484-0313","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6130-3668","authenticated-orcid":false,"given":"Lingjia","family":"Meng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2639-3722","authenticated-orcid":false,"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8012-8295","authenticated-orcid":false,"given":"Qiongxiao","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2615-8300","authenticated-orcid":false,"given":"Linli","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. sgx-nbench. https:\/\/github.com\/utds3lab\/sgx-nbench.  2017. sgx-nbench. https:\/\/github.com\/utds3lab\/sgx-nbench."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. sgx-step. https:\/\/github.com\/jovanbulck\/sgx-step.  2017. sgx-step. https:\/\/github.com\/jovanbulck\/sgx-step."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Intel Transactional Synchronization Extensions (Intel TSX) Asynchronous Abort \/ CVE-2019-11135 \/ INTEL-SA-00270. https:\/\/www.intel.cn\/content\/www\/cn\/zh\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/intel-tsx-asynchronous-abort.html?wapkw=TAA.  2019. Intel Transactional Synchronization Extensions (Intel TSX) Asynchronous Abort \/ CVE-2019-11135 \/ INTEL-SA-00270. https:\/\/www.intel.cn\/content\/www\/cn\/zh\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/intel-tsx-asynchronous-abort.html?wapkw=TAA."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Mastik. https:\/\/github.com\/0xADE1A1DE\/Mastik.  2022. Mastik. https:\/\/github.com\/0xADE1A1DE\/Mastik."},{"key":"e_1_3_2_1_5_1","volume-title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Ahmad Adil","year":"2019","unstructured":"Adil Ahmad , Byunggill Joe , Yuan Xiao , Yinqian Zhang , Insik Shin , and Byoungyoung Lee . 2019 . OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA , February 24-27, 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/obfuscuro-a-commodity-obfuscation-engine-on-intel-sgx\/ Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee. 2019. OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/obfuscuro-a-commodity-obfuscation-engine-on-intel-sgx\/"},{"key":"e_1_3_2_1_6_1","volume-title":"DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs\/1709.09917(2017). arxiv:1709.09917http:\/\/arxiv.org\/abs\/1709.09917","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Srdjan Capkun , Alexandra Dmitrienko , Tommaso Frassetto , Kari Kostiainen , Urs M\u00fcller , and Ahmad-Reza Sadeghi . 2017 . DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs\/1709.09917(2017). arxiv:1709.09917http:\/\/arxiv.org\/abs\/1709.09917 Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs M\u00fcller, and Ahmad-Reza Sadeghi. 2017. DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs\/1709.09917(2017). arxiv:1709.09917http:\/\/arxiv.org\/abs\/1709.09917"},{"key":"e_1_3_2_1_7_1","unstructured":"Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv preprint arXiv:1702.07521(2017) 33.  Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv preprint arXiv:1702.07521(2017) 33."},{"key":"e_1_3_2_1_8_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Bulck Jo\u00a0Van","year":"2018","unstructured":"Jo\u00a0Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas\u00a0 F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In 27th USENIX Security Symposium, USENIX Security 2018 , Baltimore, MD, USA , August 15-17, 2018. 991\u20131008. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bulck Jo\u00a0Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. 991\u20131008. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bulck"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_1_12_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Bulck Jo\u00a0Van","year":"2017","unstructured":"Jo\u00a0Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 1041\u20131056. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/van-bulck Jo\u00a0Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 1041\u20131056. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/van-bulck"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00024"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_15_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.. In NDSS. 8\u201311.  Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.. In NDSS. 8\u201311.","DOI":"10.14722\/ndss.2015.23264"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484821"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.21"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium.","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olya Ohrimenko , Istvan Haller , and Manuel Costa . 2017 . Strong and efficient cache side-channel protection using hardware transactional memory . In USENIX Security Symposium. Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and efficient cache side-channel protection using hardware transactional memory. In USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_21_1","unstructured":"Shay Gueron. 2016. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptol. ePrint Arch.(2016) 204. http:\/\/eprint.iacr.org\/2016\/204  Shay Gueron. 2016. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptol. ePrint Arch.(2016) 204. http:\/\/eprint.iacr.org\/2016\/204"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Johannes G\u00f6tzfried Moritz Eckert Sebastian Schinzel and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX.  Johannes G\u00f6tzfried Moritz Eckert Sebastian Schinzel and Tilo M\u00fcller. 2017. Cache Attacks on Intel SGX.","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165164"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Matthew Hoekstra Reshma Lal Pradeep Pappachan Vinay Phegade and Juan Del\u00a0Cuvillo. 2013. Using innovative instructions to create trustworthy software solutions.(2013) 11.  Matthew Hoekstra Reshma Lal Pradeep Pappachan Vinay Phegade and Juan Del\u00a0Cuvillo. 2013. Using innovative instructions to create trustworthy software solutions.(2013) 11.","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_25_1","volume-title":"Intel Software Guard Extensions Programming Reference. (Oct","year":"2014","unstructured":"Intel. 2014. Intel Software Guard Extensions Programming Reference. (Oct . 2014 ). Reference no. 329298-002US.. Intel. 2014. Intel Software Guard Extensions Programming Reference. (Oct. 2014). Reference no. 329298-002US.."},{"key":"e_1_3_2_1_26_1","volume-title":"Intel 64 and IA-32 architectures software developer\u2019s manual. (Dec","year":"2015","unstructured":"Intel. 2015. Intel 64 and IA-32 architectures software developer\u2019s manual. (Dec . 2015 ). Intel. 2015. Intel 64 and IA-32 architectures software developer\u2019s manual. (Dec. 2015)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86890-1_18"},{"key":"e_1_3_2_1_29_1","volume-title":"ArXiv e-prints (jan","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018. Meltdown. ArXiv e-prints (jan 2018 ). arxiv:1801.01207 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. ArXiv e-prints (jan 2018). arxiv:1801.01207"},{"key":"e_1_3_2_1_30_1","unstructured":"Salvatore\u00a0S. Mangiafico. 2016. Goodness-of-Fit Tests for Nominal Variables. https:\/\/rcompanion.org\/handbook\/H_03.html.  Salvatore\u00a0S. Mangiafico. 2016. Goodness-of-Fit Tests for Nominal Variables. https:\/\/rcompanion.org\/handbook\/H_03.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos\u00a0V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday\u00a0R Savagaonkar. 2013. Innovative instructions and software model for isolated execution.HASP@ ISCA 10(2013).  Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos\u00a0V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday\u00a0R Savagaonkar. 2013. Innovative instructions and software model for isolated execution.HASP@ ISCA 10(2013).","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_32_1","volume-title":"2018 USENIX Annual Technical Conference, USENIX ATC 2018","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko , Bohdan Trach , Robert Krahn , Mark Silberstein , and Christof Fetzer . 2018 . Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks . In 2018 USENIX Annual Technical Conference, USENIX ATC 2018 , Boston, MA, USA , July 11-13, 2018. 227\u2013240. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oleksenko Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In 2018 USENIX Annual Technical Conference, USENIX ATC 2018, Boston, MA, USA, July 11-13, 2018. 227\u2013240. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oleksenko"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_1_35_1","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution . In 24th USENIX Security Symposium, USENIX Security 15 , Washington, D.C., USA , August 12-14, 2015, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 431\u2013446. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 431\u2013446. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/rane"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"e_1_3_2_1_38_1","volume-title":"SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Seo Jaebaek","year":"2017","unstructured":"Jaebaek Seo , Byoungyoung Lee , Seong\u00a0Min Kim , Ming-Wei Shih , Insik Shin , Dongsu Han , and Taesoo Kim . 2017 . SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017 , San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/sgx-shield-enabling-address-space-layout-randomization-sgx-programs\/ Jaebaek Seo, Byoungyoung Lee, Seong\u00a0Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/sgx-shield-enabling-address-space-layout-randomization-sgx-programs\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2724966.2725064"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_43_1","unstructured":"Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX Fails in Practice. http:\/\/cacheoutattack.com\/files\/SGAxe.pdf  Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX Fails in Practice. http:\/\/cacheoutattack.com\/files\/SGAxe.pdf"},{"key":"e_1_3_2_1_44_1","volume-title":"conference on computer and communications security. ACM Conference on Computer and Communications Security(2019)","author":"Vincent","year":"2019","unstructured":"Wenhao, Wang, Guoxing, Chen, Xiaorui, Pan, Yinqian, Zhang, XiaoFeng, and Vincent and. 2019 . Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security(2019) . Wenhao, Wang, Guoxing, Chen, Xiaorui, Pan, Yinqian, Zhang, XiaoFeng, and Vincent and. 2019. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.Conference on Computer and Communications Security : proceedings of the... conference on computer and communications security. ACM Conference on Computer and Communications Security(2019)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_46_1","volume-title":"Usenix Conference on Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack . In Usenix Conference on Security Symposium. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In Usenix Conference on Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 719\u2013732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 719\u2013732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378487"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516741"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3568002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3568002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:29Z","timestamp":1750182569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3568002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":49,"alternative-id":["10.1145\/3564625.3568002","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3568002","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}