{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:38Z","timestamp":1750219838220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T00:00:00Z","timestamp":1679702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["Resilient Architectures and Robust Electronics (RARE)"],"award-info":[{"award-number":["Resilient Architectures and Robust Electronics (RARE)"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["JUMP 2.0 ACE Center"],"award-info":[{"award-number":["JUMP 2.0 ACE Center"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1942888, 1954521"],"award-info":[{"award-number":["1942888, 1954521"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,25]]},"DOI":"10.1145\/3582016.3582033","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T16:59:03Z","timestamp":1679331543000},"page":"771-788","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes"],"prefix":"10.1145","author":[{"given":"Zirui Neil","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Israel"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,25]]},"reference":[{"volume-title":"Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy (SP). 870\u2013887","author":"Aldaya A. C.","key":"e_1_3_2_1_1_1","unstructured":"A. C. Aldaya , B. B. Brumley , S. ul Hassan , C. Pereida Garcia , and N. Tuveri . 2019 . Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy (SP). 870\u2013887 . A. C. Aldaya, B. B. Brumley, S. ul Hassan, C. Pereida Garcia, and N. Tuveri. 2019. Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy (SP). 870\u2013887."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"e_1_3_2_1_3_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 797\u2013809","author":"Bao Qinkun","year":"2021","unstructured":"Qinkun Bao , Zihao Wang , Xiaoting Li , James R Larus , and Dinghao Wu . 2021 . Abacus: Precise side-channel analysis . In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 797\u2013809 . Qinkun Bao, Zihao Wang, Xiaoting Li, James R Larus, and Dinghao Wu. 2021. Abacus: Precise side-channel analysis. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 797\u2013809."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 22nd international conference on Parallel architectures and compilation techniques. 213\u2013224","author":"Beckmann Nathan","year":"2013","unstructured":"Nathan Beckmann and Daniel Sanchez . 2013 . Jigsaw: Scalable software-defined caches . In Proceedings of the 22nd international conference on Parallel architectures and compilation techniques. 213\u2013224 . Nathan Beckmann and Daniel Sanchez. 2013. Jigsaw: Scalable software-defined caches. In Proceedings of the 22nd international conference on Parallel architectures and compilation techniques. 213\u2013224."},{"volume-title":"26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1046\u20131060","author":"Behnia Mohammad","key":"e_1_3_2_1_5_1","unstructured":"Mohammad Behnia , Prateek Sahu , Riccardo Paccagnella , Jiyong Yu , Zirui Neil Zhao , Xiang Zou , Thomas Unterluggauer , Josep Torrellas , Carlos V. Rozas , Adam Morrison , Frank McKeen , Fangfei Liu , Ron Gabor , Christopher W. Fletcher , Abhishek Basak , and Alaa R. Alameldeen . 2021. Speculative interference attacks: breaking invisible speculation schemes. In ASPLOS \u201921 : 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1046\u20131060 . Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, and Alaa R. Alameldeen. 2021. Speculative interference attacks: breaking invisible speculation schemes. In ASPLOS \u201921: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. 1046\u20131060."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_7_1","volume-title":"Wood","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert , Bradford Beckmann , Gabriel Black , Steven K Reinhardt , Ali Saidi , Arkaprava Basu , Joel Hestness , Derek R Hower , Tushar Krishna , Somayeh Sardashti , Rathijit Sen , Korey Sewell , Muhammad Shoaib , Nilay Vaish , Mark D. Hill , and David A . Wood . 2011 . The Gem5 Simulator. ACM SIGARCH Computer Architecture News . Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven K Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek R Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark D. Hill, and David A. Wood. 2011. The Gem5 Simulator. ACM SIGARCH Computer Architecture News."},{"key":"e_1_3_2_1_8_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP).","author":"Brotzman Robert","year":"2019","unstructured":"Robert Brotzman , Shen Liu , Danfeng Zhang , Gang Tan , and Mahmut Kandemir . 2019 . CaSym: Cache aware symbolic execution for side channel detection and mitigation . In 2019 IEEE Symposium on Security and Privacy (SP). Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, and Mahmut Kandemir. 2019. CaSym: Cache aware symbolic execution for side channel detection and mitigation. In 2019 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3288758"},{"key":"e_1_3_2_1_11_1","unstructured":"OpenSSL Contributors. 2022. OpenSSL 3.0.5. https:\/\/github.com\/openssl\/openssl\/releases\/tag\/openssl-3.0.5 \t\t\t\t  OpenSSL Contributors. 2022. OpenSSL 3.0.5. https:\/\/github.com\/openssl\/openssl\/releases\/tag\/openssl-3.0.5"},{"key":"e_1_3_2_1_12_1","volume-title":"Thomas","author":"Cover Thomas M.","year":"2006","unstructured":"Thomas M. Cover and Joy A . Thomas . 2006 . Elements of information theory ( 2 nd edition). Wiley . Thomas M. Cover and Joy A. Thomas. 2006. Elements of information theory (2nd edition). Wiley.","edition":"2"},{"key":"e_1_3_2_1_13_1","volume-title":"Secure TLBs. In Proceedings of the 46th International Symposium on Computer Architecture (ISCA\u201919)","author":"Deng Shuwen","year":"2019","unstructured":"Shuwen Deng , Wenjie Xiong , and Jakub Szefer . 2019 . Secure TLBs. In Proceedings of the 46th International Symposium on Computer Architecture (ISCA\u201919) . Shuwen Deng, Wenjie Xiong, and Jakub Szefer. 2019. Secure TLBs. In Proceedings of the 46th International Symposium on Computer Architecture (ISCA\u201919)."},{"key":"e_1_3_2_1_14_1","volume-title":"HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Dessouky Ghada","year":"2020","unstructured":"Ghada Dessouky , Tommaso Frassetto , and Ahmad-Reza Sadeghi . 2020 . HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. In 29th USENIX Security Symposium (USENIX Security 20) . Ghada Dessouky, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2020. HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_15_1","volume-title":"Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. In 29th Annual Network and Distributed System Security Symposium, NDSS.","author":"Dessouky Ghada","year":"2022","unstructured":"Ghada Dessouky , Emmanuel Stapf , Pouya Mahmoody , Alexander Gruler , and Ahmad-Reza Sadeghi . 2022 . Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. In 29th Annual Network and Distributed System Security Symposium, NDSS. Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, and Ahmad-Reza Sadeghi. 2022. Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. In 29th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507747"},{"key":"e_1_3_2_1_17_1","volume-title":"On nonlinear fractional programming. Management science, 13, 7","author":"Dinkelbach Werner","year":"1967","unstructured":"Werner Dinkelbach . 1967. On nonlinear fractional programming. Management science, 13, 7 ( 1967 ), 492\u2013498. Werner Dinkelbach. 1967. On nonlinear fractional programming. Management science, 13, 7 (1967), 492\u2013498."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 22th USENIX Security Symposium. 431\u2013446","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris K\u00f6pf , Laurent Mauborgne , and Jan Reineke . 2013 . CacheAudit: A Tool for the Static Analysis of Cache Side Channels . In Proceedings of the 22th USENIX Security Symposium. 431\u2013446 . Goran Doychev, Dominik Feld, Boris K\u00f6pf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In Proceedings of the 22th USENIX Security Symposium. 431\u2013446."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062388"},{"key":"e_1_3_2_1_20_1","volume-title":"2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA). 213\u2013224","author":"Fletcher Christopher W.","year":"2014","unstructured":"Christopher W. Fletcher , Ling Ren , Xiangyao Yu , Marten Van Dijk , Omer Khan , and Srinivas Devadas . 2014 . Suppressing the oblivious RAM timing channel while making information leakage and program efficiency trade-offs . In 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA). 213\u2013224 . Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten Van Dijk, Omer Khan, and Srinivas Devadas. 2014. Suppressing the oblivious RAM timing channel while making information leakage and program efficiency trade-offs. In 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA). 213\u2013224."},{"key":"e_1_3_2_1_21_1","unstructured":"Ben Gras Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security. \t\t\t\t  Ben Gras Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security."},{"key":"e_1_3_2_1_22_1","unstructured":"The PostgreSQL Global Development Group. 2023. PostgreSQL: The world\u2019s most advanced open source database. https:\/\/www.postgresql.org\/ \t\t\t\t  The PostgreSQL Global Development Group. 2023. PostgreSQL: The world\u2019s most advanced open source database. https:\/\/www.postgresql.org\/"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 279\u2013299","author":"Gruss Daniel","year":"2016","unstructured":"Daniel Gruss , Cl\u00e9mentine Maurice , Klaus Wagner , and Stefan Mangard . 2016 . Flush+Flush: a fast and stealthy cache attack . In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 279\u2013299 . Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+Flush: a fast and stealthy cache attack. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 279\u2013299."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Simpoint 3.0: Faster and more flexible program phase analysis","volume":"7","author":"Hamerly Greg","year":"2005","unstructured":"Greg Hamerly , Erez Perelman , Jeremy Lau , and Brad Calder . 2005 . Simpoint 3.0: Faster and more flexible program phase analysis . Journal of Instruction Level Parallelism , 7 , 4 (2005), 1 \u2013 28 . Greg Hamerly, Erez Perelman, Jeremy Lau, and Brad Calder. 2005. Simpoint 3.0: Faster and more flexible program phase analysis. Journal of Instruction Level Parallelism, 7, 4 (2005), 1\u201328.","journal-title":"Journal of Instruction Level Parallelism"},{"key":"e_1_3_2_1_25_1","unstructured":"Intel. 2021. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html \t\t\t\t  Intel. 2021. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html"},{"key":"e_1_3_2_1_26_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"e_1_3_2_1_28_1","volume-title":"2016 IEEE international symposium on high performance computer architecture (HPCA). 406\u2013418","author":"Liu Fangfei","year":"2016","unstructured":"Fangfei Liu , Qian Ge , Yuval Yarom , Frank Mckeen , Carlos Rozas , Gernot Heiser , and Ruby B Lee . 2016 . Catalyst: Defeating last-level cache side channel attacks in cloud computing . In 2016 IEEE international symposium on high performance computer architecture (HPCA). 406\u2013418 . Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser, and Ruby B Lee. 2016. Catalyst: Defeating last-level cache side channel attacks in cloud computing. In 2016 IEEE international symposium on high performance computer architecture (HPCA). 406\u2013418."},{"volume-title":"Random Fill Cache Architecture. In 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO\u201914)","author":"Liu Fangfei","key":"e_1_3_2_1_29_1","unstructured":"Fangfei Liu and Ruby B. Lee . 2014 . Random Fill Cache Architecture. In 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO\u201914) . Fangfei Liu and Ruby B. Lee. 2014. Random Fill Cache Architecture. In 47th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO\u201914)."},{"key":"e_1_3_2_1_30_1","unstructured":"Andrew C. Myers Lantian Zheng Steve Zdancewic Stephen Chong and Nathaniel Nystrom. 2006. Jif 3.0: Java information flow. http:\/\/www.cs.cornell.edu\/jif \t\t\t\t  Andrew C. Myers Lantian Zheng Steve Zdancewic Stephen Chong and Nathaniel Nystrom. 2006. Jif 3.0: Java information flow. http:\/\/www.cs.cornell.edu\/jif"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_32_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Paccagnella Riccardo","year":"2021","unstructured":"Riccardo Paccagnella , Licheng Luo , and Christopher W Fletcher . 2021 . Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical . In 30th USENIX Security Symposium (USENIX Security 21) . Riccardo Paccagnella, Licheng Luo, and Christopher W Fletcher. 2021. Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_1_33_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , and Luca Antiga . 2019 . Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32 (2019). Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, and Luca Antiga. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32 (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Systematic Analysis of Randomization-based Protected Cache Architectures. In IEEE Symposium on Security and Privacy (S&P\u201921)","author":"Purnal Antoon","year":"2021","unstructured":"Antoon Purnal , Lukas Giner , Daniel Gruss , and Ingrid Verbauwhede . 2021 . Systematic Analysis of Randomization-based Protected Cache Architectures. In IEEE Symposium on Security and Privacy (S&P\u201921) . Antoon Purnal, Lukas Giner, Daniel Gruss, and Ingrid Verbauwhede. 2021. Systematic Analysis of Randomization-based Protected Cache Architectures. In IEEE Symposium on Security and Privacy (S&P\u201921)."},{"key":"e_1_3_2_1_35_1","volume-title":"2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 360\u2013371","author":"Qureshi Moinuddin K","year":"2019","unstructured":"Moinuddin K Qureshi . 2019 . New attacks and defense for encrypted-address cache . In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 360\u2013371 . Moinuddin K Qureshi. 2019. New attacks and defense for encrypted-address cache. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 360\u2013371."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.49"},{"key":"e_1_3_2_1_37_1","volume-title":"2021 International Symposium on Secure and Private Execution Environment Design (SEED). 37\u201349","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar , Sanjay Kariyappa , and Moinuddin Qureshi . 2021 . Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning . In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). 37\u201349 . Gururaj Saileshwar, Sanjay Kariyappa, and Moinuddin Qureshi. 2021. Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). 37\u201349."},{"key":"e_1_3_2_1_38_1","volume-title":"ConTExT: A Generic Approach for Mitigating Spectre. In 27th Annual Network and Distributed System Security Symposium (NDSS).","author":"Schwarz Michael","year":"2020","unstructured":"Michael Schwarz , Moritz Lipp , Claudio Canella , Robert Schilling , Florian Kargl , and Daniel Gruss . 2020 . ConTExT: A Generic Approach for Mitigating Spectre. In 27th Annual Network and Distributed System Security Symposium (NDSS). Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, and Daniel Gruss. 2020. ConTExT: A Generic Approach for Mitigating Spectre. In 27th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_39_1","volume-title":"Jumanji: The Case for Dynamic NUCA in the Datacenter. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 665\u2013680","author":"Schwedock Brian C","year":"2020","unstructured":"Brian C Schwedock and Nathan Beckmann . 2020 . Jumanji: The Case for Dynamic NUCA in the Datacenter. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 665\u2013680 . Brian C Schwedock and Nathan Beckmann. 2020. Jumanji: The Case for Dynamic NUCA in the Datacenter. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 665\u2013680."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2812733"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 331\u2013342","author":"Sun Mingshen","year":"2016","unstructured":"Mingshen Sun , Tao Wei , and John CS Lui . 2016 . Taintart: A practical multi-level information-flow tracking system for Android runtime . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 331\u2013342 . Mingshen Sun, Tao Wei, and John CS Lui. 2016. Taintart: A practical multi-level information-flow tracking system for Android runtime. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 331\u2013342."},{"key":"e_1_3_2_1_42_1","volume-title":"PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. In 27th Annual Network and Distributed System Security Symposium (NDSS).","author":"Tan Qinhan","year":"2020","unstructured":"Qinhan Tan , Zhihua Zeng , Kai Bu , and Kui Ren . 2020 . PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. In 27th Annual Network and Distributed System Security Symposium (NDSS). Qinhan Tan, Zhihua Zeng, Kai Bu, and Kui Ren. 2020. PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. In 27th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium.","author":"Taram Mohammadkazem","year":"2022","unstructured":"Mohammadkazem Taram , Xida Ren , Ashish Venkat , and Dean Tullsen . 2022 . SecSMT: Securing SMT processors against contention-based covert channels . In USENIX Security Symposium. Mohammadkazem Taram, Xida Ren, Ashish Venkat, and Dean Tullsen. 2022. SecSMT: Securing SMT processors against contention-based covert channels. In USENIX Security Symposium."},{"key":"e_1_3_2_1_44_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Tatar Andrei","year":"2022","unstructured":"Andrei Tatar , Dani\u00ebl Trujillo , Cristiano Giuffrida , and Herbert Bos . 2022 . TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering . In 31st USENIX Security Symposium (USENIX Security 22) . 989\u20131007. Andrei Tatar, Dani\u00ebl Trujillo, Cristiano Giuffrida, and Herbert Bos. 2022. TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. In 31st USENIX Security Symposium (USENIX Security 22). 989\u20131007."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_46_1","volume-title":"2022 USENIX Security Symposium.","author":"Townley Daniel","year":"2022","unstructured":"Daniel Townley , Kerem Ar\u0131kan , Yu David Liu , Dmitry Ponomarev , and Oguz Ergin . 2022 . Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks . In 2022 USENIX Security Symposium. Daniel Townley, Kerem Ar\u0131kan, Yu David Liu, Dmitry Ponomarev, and Oguz Ergin. 2022. Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks. In 2022 USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"SMT-COP: Defeating Side-Channel Attacks on Execution Units in SMT Processors. In 28th International Conference on Parallel Architectures and Compilation Techniques (PACT\u201919)","author":"Townley Daniel","year":"2019","unstructured":"Daniel Townley and Dmitry Ponomarev . 2019 . SMT-COP: Defeating Side-Channel Attacks on Execution Units in SMT Processors. In 28th International Conference on Parallel Architectures and Compilation Techniques (PACT\u201919) . 43\u201354. Daniel Townley and Dmitry Ponomarev. 2019. SMT-COP: Defeating Side-Channel Attacks on Execution Units in SMT Processors. In 28th International Conference on Parallel Architectures and Compilation Techniques (PACT\u201919). 43\u201354."},{"volume-title":"BRB: Mitigating Branch Predictor Side-Channels. In IEEE International Symposium on High Performance Computer Architecture (HPCA\u201919)","author":"Vougioukas Ilias","key":"e_1_3_2_1_48_1","unstructured":"Ilias Vougioukas , Nikos Nikoleris , Andreas Sandberg , Stephan Diestelhorst , Bashir M. Al-Hashimi , and Geoff V. Merrett . 2019 . BRB: Mitigating Branch Predictor Side-Channels. In IEEE International Symposium on High Performance Computer Architecture (HPCA\u201919) . Ilias Vougioukas, Nikos Nikoleris, Andreas Sandberg, Stephan Diestelhorst, Bashir M. Al-Hashimi, and Geoff V. Merrett. 2019. BRB: Mitigating Branch Predictor Side-Channels. In IEEE International Symposium on High Performance Computer Architecture (HPCA\u201919)."},{"volume-title":"28th USENIX security symposium (USENIX security 19). 657\u2013674.","author":"Wang Shuai","key":"e_1_3_2_1_49_1","unstructured":"Shuai Wang , Yuyan Bao , Xiao Liu , Pei Wang , Danfeng Zhang , and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation . In 28th USENIX security symposium (USENIX security 19). 657\u2013674. Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. In 28th USENIX security symposium (USENIX security 19). 657\u2013674."},{"key":"e_1_3_2_1_50_1","volume-title":"CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang , Pei Wang , Xiao Liu , Danfeng Zhang , and Dinghao Wu . 2017 . CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium (USENIX Security 17) . 235\u2013252. Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium (USENIX Security 17). 235\u2013252."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 53rd Annual Design Automation Conference. 1\u20136.","author":"Wang Yao","year":"2016","unstructured":"Yao Wang , Andrew Ferraiuolo , Danfeng Zhang , Andrew C Myers , and G Edward Suh . 2016 . SecDCP: secure dynamic cache partitioning for efficient timing channel protection . In Proceedings of the 53rd Annual Design Automation Conference. 1\u20136. Yao Wang, Andrew Ferraiuolo, Danfeng Zhang, Andrew C Myers, and G Edward Suh. 2016. SecDCP: secure dynamic cache partitioning for efficient timing channel protection. In Proceedings of the 53rd Annual Design Automation Conference. 1\u20136."},{"volume-title":"Proceedings of the 34th Annual International Symposium on Computer Architecture. 494\u2013505","author":"Wang Zhenghong","key":"e_1_3_2_1_52_1","unstructured":"Zhenghong Wang and Ruby B. Lee . 2007. New cache designs for thwarting software cache-based side channel attacks . In Proceedings of the 34th Annual International Symposium on Computer Architecture. 494\u2013505 . Zhenghong Wang and Ruby B. Lee. 2007. New cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 34th Annual International Symposium on Computer Architecture. 494\u2013505."},{"key":"e_1_3_2_1_53_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Weiser Samuel","year":"2018","unstructured":"Samuel Weiser , Andreas Zankl , Raphael Spreitzer , Katja Miller , Stefan Mangard , and Georg Sigl . 2018 . DATA\u2013Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries . In 27th USENIX Security Symposium (USENIX Security 18) . 603\u2013620. Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, and Georg Sigl. 2018. DATA\u2013Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. In 27th USENIX Security Symposium (USENIX Security 18). 603\u2013620."},{"key":"e_1_3_2_1_54_1","unstructured":"Mario Werner Thomas Unterluggauer Lukas Giner Michael Schwarz Daniel Gruss and Stefan Mangard. 2019. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. In USENIX Security. \t\t\t\t  Mario Werner Thomas Unterluggauer Lukas Giner Michael Schwarz Daniel Gruss and Stefan Mangard. 2019. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. In USENIX Security."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274741"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 859\u2013874","author":"Xiao Yuan","year":"2017","unstructured":"Yuan Xiao , Mengyuan Li , Sanchuan Chen , and Yinqian Zhang . 2017 . Stacco: Differentially analyzing side-channel traces for detecting SSL\/TLS vulnerabilities in secure enclaves . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 859\u2013874 . Yuan Xiao, Mengyuan Li, Sanchuan Chen, and Yinqian Zhang. 2017. Stacco: Differentially analyzing side-channel traces for detecting SSL\/TLS vulnerabilities in secure enclaves. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 859\u2013874."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In Proceedings of the 23rd USENIX Security Symposium. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","volume-title":"CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Yuan Yuanyuan","year":"2023","unstructured":"Yuanyuan Yuan , Zhibo Liu , and Shuai Wang . 2023 . CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. In 32nd USENIX Security Symposium (USENIX Security 23) . Yuanyuan Yuan, Zhibo Liu, and Shuai Wang. 2023. CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. In 32nd USENIX Security Symposium (USENIX Security 23)."},{"key":"e_1_3_2_1_60_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yuan Yuanyuan","year":"2022","unstructured":"Yuanyuan Yuan , Qi Pang , and Shuai Wang . 2022 . Automated side channel analysis of media software with manifold learning . In 31st USENIX Security Symposium (USENIX Security 22) . 4419\u20134436. Yuanyuan Yuan, Qi Pang, and Shuai Wang. 2022. Automated side channel analysis of media software with manifold learning. In 31st USENIX Security Symposium (USENIX Security 22). 4419\u20134436."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046772"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586178"}],"event":{"name":"ASPLOS '23: 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Vancouver BC Canada","acronym":"ASPLOS '23"},"container-title":["Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:45Z","timestamp":1750178805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,25]]},"references-count":62,"alternative-id":["10.1145\/3582016.3582033","10.1145\/3582016"],"URL":"https:\/\/doi.org\/10.1145\/3582016.3582033","relation":{},"subject":[],"published":{"date-parts":[[2023,3,25]]},"assertion":[{"value":"2023-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}