{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:55Z","timestamp":1774448995507,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589080","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5691-6405","authenticated-orcid":false,"given":"Sankha Baran","family":"Dutta","sequence":"first","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0468-3032","authenticated-orcid":false,"given":"Hoda","family":"Naghibijouybari","sequence":"additional","affiliation":[{"name":"Binghamton University, Binghampton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4573-2937","authenticated-orcid":false,"given":"Arjun","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9485-5370","authenticated-orcid":false,"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4313-1882","authenticated-orcid":false,"given":"Andres","family":"Marquez","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab, Richland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4947-0559","authenticated-orcid":false,"given":"Kevin","family":"Barker","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab, Richland, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00036"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480093"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480093"},{"key":"e_1_3_2_1_4_1","unstructured":"AMD. 2017. AMD CrossFire guide for Direct3D\u00ae 11 applications.  AMD. 2017. AMD CrossFire guide for Direct3D\u00ae 11 applications."},{"key":"e_1_3_2_1_5_1","unstructured":"AMD. 2022. Introducing AMD CDNA\u2122 2 Architecture. https:\/\/www.amd.com\/system\/files\/documents\/amd-cdna2-white-paper.pdf.  AMD. 2022. Introducing AMD CDNA\u2122 2 Architecture. https:\/\/www.amd.com\/system\/files\/documents\/amd-cdna2-white-paper.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory. In 2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Choi Sangjin","year":"2022","unstructured":"Sangjin Choi , Taeksoo Kim , Jinwoo Jeong , Rachata Ausavarungnirun , Myeongjae Jeon , Youngjin Kwon , and Jeongseob Ahn . 2022 . Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory. In 2022 USENIX Annual Technical Conference (USENIX ATC 22) . USENIX Association, Carlsbad, CA, 625--638. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/choi-sangjin Sangjin Choi, Taeksoo Kim, Jinwoo Jeong, Rachata Ausavarungnirun, Myeongjae Jeon, Youngjin Kwon, and Jeongseob Ahn. 2022. Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). USENIX Association, Carlsbad, CA, 625--638. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/choi-sangjin"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086714"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00080"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196042"},{"key":"e_1_3_2_1_11_1","volume-title":"DIMVA 2016, San Sebasti\u00e1n, Spain, July 7--8, 2016, Proceedings 13","author":"Gruss Daniel","year":"2016","unstructured":"Daniel Gruss , Cl\u00e9mentine Maurice , Klaus Wagner , and Stefan Mangard . 2016 . Flush+ Flush: a fast and stealthy cache attack. In Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference , DIMVA 2016, San Sebasti\u00e1n, Spain, July 7--8, 2016, Proceedings 13 . Springer, 279--299. Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+ Flush: a fast and stealthy cache attack. In Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebasti\u00e1n, Spain, July 7--8, 2016, Proceedings 13. Springer, 279--299."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897867"},{"key":"e_1_3_2_1_14_1","volume-title":"2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 29--41","author":"Jain Saksham","year":"2019","unstructured":"Saksham Jain , Iljoo Baek , Shige Wang , and Ragunathan Rajkumar . 2019 . Fractional GPUs: Software-based compute and memory bandwidth reservation for GPUs . In 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 29--41 . Saksham Jain, Iljoo Baek, Shige Wang, and Ragunathan Rajkumar. 2019. Fractional GPUs: Software-based compute and memory bandwidth reservation for GPUs. In 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 29--41."},{"key":"e_1_3_2_1_15_1","volume-title":"Dissecting the NVIDIA volta GPU architecture via microbenchmarking. arXiv preprint arXiv:1804.06826","author":"Jia Zhe","year":"2018","unstructured":"Zhe Jia , Marco Maggioni , Benjamin Staiger , and Daniele P Scarpazza . 2018. Dissecting the NVIDIA volta GPU architecture via microbenchmarking. arXiv preprint arXiv:1804.06826 ( 2018 ). Zhe Jia, Marco Maggioni, Benjamin Staiger, and Daniele P Scarpazza. 2018. Dissecting the NVIDIA volta GPU architecture via microbenchmarking. arXiv preprint arXiv:1804.06826 (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446081"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060462"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286216"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798277"},{"key":"e_1_3_2_1_20_1","unstructured":"Oak Ridge National Laboratory. 2022. Systems. https:\/\/docs.olcf.ornl.gov\/systems\/crusher_quick_start_guide.html.  Oak Ridge National Laboratory. 2022. Systems. https:\/\/docs.olcf.ornl.gov\/systems\/crusher_quick_start_guide.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Pacific Northwest National Laboratory. 2016. Nvidia DGX-1 housed in PNNL's campus. https:\/\/www.pnnl.gov\/science\/highlights\/highlight.asp?id=4431.  Pacific Northwest National Laboratory. 2016. Nvidia DGX-1 housed in PNNL's campus. https:\/\/www.pnnl.gov\/science\/highlights\/highlight.asp?id=4431."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_24_1","volume-title":"Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. In 2019 IEEE Security and Privacy Workshops (SPW). 156--161","author":"Liu S.","unstructured":"S. Liu , Y. Wei , J. Chi , F. H. Shezan , and Y. Tian . 2019 . Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. In 2019 IEEE Security and Privacy Workshops (SPW). 156--161 . S. Liu, Y. Wei, J. Chi, F. H. Shezan, and Y. Tian. 2019. Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. In 2019 IEEE Security and Privacy Workshops (SPW). 156--161."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357115"},{"key":"e_1_3_2_1_26_1","unstructured":"Tobias Mann. 2020. Amazon Amps Up Cloud With Nvidia A100s. https:\/\/www.sdxcentral.com\/articles\/news\/amazon-amps-up-cloud-with-nvidia-a100s\/2020\/11\/.  Tobias Mann. 2020. Amazon Amps Up Cloud With Nvidia A100s. https:\/\/www.sdxcentral.com\/articles\/news\/amazon-amps-up-cloud-with-nvidia-a100s\/2020\/11\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2549523"},{"key":"e_1_3_2_1_29_1","volume-title":"Constructing and Characterizing Covert Channels on GPGPUs. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 354--366","author":"Naghibijouybari Hoda","year":"2017","unstructured":"Hoda Naghibijouybari , Khaled N. Khasawneh , and Nael Abu-Ghazaleh . 2017 . Constructing and Characterizing Covert Channels on GPGPUs. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 354--366 . Hoda Naghibijouybari, Khaled N. Khasawneh, and Nael Abu-Ghazaleh. 2017. Constructing and Characterizing Covert Channels on GPGPUs. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 354--366."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"e_1_3_2_1_31_1","volume-title":"Efficient Large-Scale Language Model Training on GPU Clusters. CoRR abs\/2104.04473","author":"Narayanan Deepak","year":"2021","unstructured":"Deepak Narayanan , Mohammad Shoeybi , Jared Casper , Patrick LeGresley , Mostofa Patwary , Vijay Korthikanti , Dmitri Vainbrand , Prethvi Kashinkunti , Julie Bernauer , Bryan Catanzaro , Amar Phanishayee , and Matei Zaharia . 2021. Efficient Large-Scale Language Model Training on GPU Clusters. CoRR abs\/2104.04473 ( 2021 ). https:\/\/arxiv.org\/abs\/2104.04473 Deepak Narayanan, Mohammad Shoeybi, Jared Casper, Patrick LeGresley, Mostofa Patwary, Vijay Korthikanti, Dmitri Vainbrand, Prethvi Kashinkunti, Julie Bernauer, Bryan Catanzaro, Amar Phanishayee, and Matei Zaharia. 2021. Efficient Large-Scale Language Model Training on GPU Clusters. CoRR abs\/2104.04473 (2021). https:\/\/arxiv.org\/abs\/2104.04473"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453077"},{"key":"e_1_3_2_1_33_1","unstructured":"Nvidia. [n. d.]. https:\/\/www.nvidia.com\/en-us\/data-center\/resources\/mlperf-benchmarks\/.  Nvidia. [n. d.]. https:\/\/www.nvidia.com\/en-us\/data-center\/resources\/mlperf-benchmarks\/."},{"key":"e_1_3_2_1_34_1","unstructured":"Nvidia. 2017. NVIDIA DGX-1 System Architecture White Paper.  Nvidia. 2017. NVIDIA DGX-1 System Architecture White Paper."},{"key":"e_1_3_2_1_35_1","unstructured":"Nvidia. 2020. GPU-Accelerated Google Clouds Google Cloud Anthos on NVIDIA DGX A100. https:\/\/www.nvidia.com\/en-us\/data-center\/gpu-cloud-computing\/google-cloud-platform\/#:~:text=NVIDIA%20DGX%20A100%20is%20the NVIDIA%20GPUs%20within%20Google%20Cloud.  Nvidia. 2020. GPU-Accelerated Google Clouds Google Cloud Anthos on NVIDIA DGX A100. https:\/\/www.nvidia.com\/en-us\/data-center\/gpu-cloud-computing\/google-cloud-platform\/#:~:text=NVIDIA%20DGX%20A100%20is%20the NVIDIA%20GPUs%20within%20Google%20Cloud."},{"key":"e_1_3_2_1_36_1","unstructured":"Nvidia. 2021. Nvidia cuda samples. https:\/\/docs.nvidia.com\/cuda\/cuda-samples\/index.html.  Nvidia. 2021. Nvidia cuda samples. https:\/\/docs.nvidia.com\/cuda\/cuda-samples\/index.html."},{"key":"e_1_3_2_1_37_1","unstructured":"Nvidia. 2021. Nvidia Multi-Instance GPU. https:\/\/www.nvidia.com\/en-us\/technologies\/multi-instance-gpu\/.  Nvidia. 2021. Nvidia Multi-Instance GPU. https:\/\/www.nvidia.com\/en-us\/technologies\/multi-instance-gpu\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Nvidia. 2021. Parallel Thread Execution ISA. https:\/\/docs.nvidia.com\/cuda\/pdf\/ptx_isa_7.6.pdf.  Nvidia. 2021. Parallel Thread Execution ISA. https:\/\/docs.nvidia.com\/cuda\/pdf\/ptx_isa_7.6.pdf."},{"key":"e_1_3_2_1_39_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017).  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017)."},{"key":"e_1_3_2_1_40_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 565--581. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 565--581. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.32"},{"key":"e_1_3_2_1_42_1","volume-title":"Dilip Sequeira, Ashish Sirasao, Fei Sun, Hanlin Tang, Michael Thomson, Frank Wei, Ephrem Wu, Lingjie Xu, Koichi Yamada, Bing Yu, George Yuan, Aaron Zhong, Peizhao Zhang, and Yuchen Zhou.","author":"Reddi Vijay Janapa","year":"2019","unstructured":"Vijay Janapa Reddi , Christine Cheng , David Kanter , Peter Mattson , Guenther Schmuelling , Carole-Jean Wu , Brian Anderson , Maximilien Breughe , Mark Charlebois , William Chou , Ramesh Chukka , Cody Coleman , Sam Davis , Pan Deng , Greg Diamos , Jared Duke , Dave Fick , J. Scott Gardner , Itay Hubara , Sachin Idgunji , Thomas B. Jablin , Jeff Jiao , Tom St. John , Pankaj Kanwar , David Lee , Jeffery Liao , Anton Lokhmotov , Francisco Massa , Peng Meng , Paulius Micikevicius , Colin Osborne , Gennady Pekhimenko , Arun Tejusve Raghunath Rajan , Dilip Sequeira, Ashish Sirasao, Fei Sun, Hanlin Tang, Michael Thomson, Frank Wei, Ephrem Wu, Lingjie Xu, Koichi Yamada, Bing Yu, George Yuan, Aaron Zhong, Peizhao Zhang, and Yuchen Zhou. 2019 . MLPerf Inference Benchmark . arXiv:1911.02549 [cs.LG] Vijay Janapa Reddi, Christine Cheng, David Kanter, Peter Mattson, Guenther Schmuelling, Carole-Jean Wu, Brian Anderson, Maximilien Breughe, Mark Charlebois, William Chou, Ramesh Chukka, Cody Coleman, Sam Davis, Pan Deng, Greg Diamos, Jared Duke, Dave Fick, J. Scott Gardner, Itay Hubara, Sachin Idgunji, Thomas B. Jablin, Jeff Jiao, Tom St. John, Pankaj Kanwar, David Lee, Jeffery Liao, Anton Lokhmotov, Francisco Massa, Peng Meng, Paulius Micikevicius, Colin Osborne, Gennady Pekhimenko, Arun Tejusve Raghunath Rajan, Dilip Sequeira, Ashish Sirasao, Fei Sun, Hanlin Tang, Michael Thomson, Frank Wei, Ephrem Wu, Lingjie Xu, Koichi Yamada, Bing Yu, George Yuan, Aaron Zhong, Peizhao Zhang, and Yuchen Zhou. 2019. MLPerf Inference Benchmark. arXiv:1911.02549 [cs.LG]"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1077--1090","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar , Christopher W Fletcher , and Moinuddin Qureshi . 2021 . Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion . In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1077--1090 . Gururaj Saileshwar, Christopher W Fletcher, and Moinuddin Qureshi. 2021. Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1077--1090."},{"key":"e_1_3_2_1_44_1","unstructured":"Cirrascale Cloud Services. 2022. Bringing NVIDIA DGX A100 to the Cloud. https:\/\/cirrascale.com\/platforms-nvidiadgx-a100.php.  Cirrascale Cloud Services. 2022. Bringing NVIDIA DGX A100 to the Cloud. https:\/\/cirrascale.com\/platforms-nvidiadgx-a100.php."},{"key":"e_1_3_2_1_45_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 639--656.","author":"Shusterman Anatoly","unstructured":"Anatoly Shusterman , Lachlan Kang , Yarden Haskal , Yosef Meltser , Prateek Mittal , Yossi Oren , and Yuval Yarom . 2019. Robust website fingerprinting through the cache occupancy channel . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 639--656. Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust website fingerprinting through the cache occupancy channel. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 639--656."},{"key":"e_1_3_2_1_46_1","volume-title":"National Cyber Summit (NCS) Research Track, Kim-Kwang Raymond Choo, Thomas H","author":"Wang Xin","unstructured":"Xin Wang and Wei Zhang . 2020. An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units . In National Cyber Summit (NCS) Research Track, Kim-Kwang Raymond Choo, Thomas H . Morris, and Gilbert L. Peterson (Eds.). Springer International Publishing , Cham , 126--139. Xin Wang and Wei Zhang. 2020. An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units. In National Cyber Summit (NCS) Research Track, Kim-Kwang Raymond Choo, Thomas H. Morris, and Gilbert L. Peterson (Eds.). Springer International Publishing, Cham, 126--139."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the International Symposium on Computer Architecture (ISCA).","author":"Wang Zhenghong","unstructured":"Zhenghong Wang and Ruby B. Lee . 2007. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks . In Proceedings of the International Symposium on Computer Architecture (ISCA). Zhenghong Wang and Ruby B. Lee. 2007. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks. In Proceedings of the International Symposium on Computer Architecture (ISCA)."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Wei Junyi","year":"2020","unstructured":"Junyi Wei , Yicheng Zhangy , Zhe Zhou , Zhou Liy , and Mohammad Abdullah Al Faruque . 2020 . Leaky DNN: Stealing Deep-learning Model Secret with GPU Context-switching Side-channel . In Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) ( Valencia, Spain). Junyi Wei, Yicheng Zhangy, Zhe Zhou, Zhou Liy, and Mohammad Abdullah Al Faruque. 2020. Leaky DNN: Stealing Deep-learning Model Secret with GPU Context-switching Side-channel. In Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (Valencia, Spain)."},{"key":"e_1_3_2_1_49_1","volume-title":"Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2012 . Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In 21st USENIX Security Symposium (USENIX Security 12) . USENIX Association, Bellevue, WA, 159--173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 159--173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330345.3330389"},{"key":"e_1_3_2_1_51_1","volume-title":"L3 cache side-channel attack. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 719--732.","author":"Yarom Yuval","unstructured":"Yuval Yarom and Katrina Falkner . 2014. FLUSH+ RELOAD : A high resolution, low noise , L3 cache side-channel attack. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 719--732. Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A high resolution, low noise, L3 cache side-channel attack. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 719--732."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437801.3441584"},{"key":"e_1_3_2_1_53_1","volume-title":"Fingerprinting Anomalous Computation with RNN for GPU-accelerated HPC Machines. In 2019 IEEE International Symposium on Workload Characterization (IISWC). 253--256","author":"Zou P.","unstructured":"P. Zou , A. Li , K. Barker , and R. Ge . 2019 . Fingerprinting Anomalous Computation with RNN for GPU-accelerated HPC Machines. In 2019 IEEE International Symposium on Workload Characterization (IISWC). 253--256 . P. Zou, A. Li, K. Barker, and R. Ge. 2019. Fingerprinting Anomalous Computation with RNN for GPU-accelerated HPC Machines. In 2019 IEEE International Symposium on Workload Characterization (IISWC). 253--256."}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","location":"Orlando FL USA","acronym":"ISCA '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"]},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:39Z","timestamp":1750178799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":53,"alternative-id":["10.1145\/3579371.3589080","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589080","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}