{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:47:02Z","timestamp":1772725622668,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1942888"],"award-info":[{"award-number":["1942888"]}]},{"name":"NSF","award":["1954521"],"award-info":[{"award-number":["1954521"]}]},{"name":"NSF","award":["CNS-1956007"],"award-info":[{"award-number":["CNS-1956007"]}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["ACE"],"award-info":[{"award-number":["ACE"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3617232.3624867","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T20:10:56Z","timestamp":1713384656000},"page":"133-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7231-7416","authenticated-orcid":false,"given":"Zirui Neil","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5586-2615","authenticated-orcid":false,"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-5995","authenticated-orcid":false,"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2595-5228","authenticated-orcid":false,"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020","author":"Agache Alexandru","year":"2020","unstructured":"Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. 2020. Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25--27, 2020. USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00066"},{"key":"e_1_3_2_1_3_1","volume-title":"CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Alipourfard Omid","year":"2017","unstructured":"Omid Alipourfard, Hongqiang Harry Liu, Jianshu Chen, Shivaram Venkataraman, Minlan Yu, and Ming Zhang. 2017. CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27--29, 2017. USENIX Association, 469--482."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon AWS. 2023. Secure and resizable cloud compute - Amazon EC2 - Amazon Web Services. https:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Amazon AWS. 2023. Serverless Computing - AWS Lambda - Amazon Web Services. https:\/\/aws.amazon.com\/lambda\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664179"},{"key":"e_1_3_2_1_7_1","unstructured":"Microsoft Azure. 2023. Azure Functions - Serverless Functions in Computing | Microsoft Azure. https:\/\/azure.microsoft.com\/en-us\/products\/functions."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7323"},{"key":"e_1_3_2_1_10_1","unstructured":"Google Cloud. 2023. About container instance autoscaling | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/about-instance-autoscaling."},{"key":"e_1_3_2_1_11_1","unstructured":"Google Cloud. 2023. About execution environments | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/about-execution-environments."},{"key":"e_1_3_2_1_12_1","unstructured":"Google Cloud. 2023. Cloud Functions | Google Cloud. https:\/\/cloud.google.com\/functions."},{"key":"e_1_3_2_1_13_1","volume-title":"Cloud Run: Container to production in seconds | Google Cloud. https:\/\/cloud.google.com\/run\/.","author":"Cloud Google","year":"2023","unstructured":"Google Cloud. 2023. Cloud Run: Container to production in seconds | Google Cloud. https:\/\/cloud.google.com\/run\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Google Cloud. 2023. Cloud Run release notes | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/release-notes."},{"key":"e_1_3_2_1_15_1","unstructured":"Google Cloud. 2023. Container runtime contract | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/container-contract."},{"key":"e_1_3_2_1_16_1","unstructured":"Google Cloud. 2023. Invoking with an HTTPS Request | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/triggering\/https-request."},{"key":"e_1_3_2_1_17_1","unstructured":"Google Cloud. 2023. Pricing | Cloud Run | Google Cloud. https:\/\/cloud.google.com\/run\/pricing."},{"key":"e_1_3_2_1_18_1","unstructured":"Google Cloud. 2023. Virtual Private Cloud (VPC) | Google Cloud. \"https:\/\/cloud.google.com\/vpc\"."},{"key":"e_1_3_2_1_19_1","unstructured":"Cloudflare. 2023. Security Model - Cloudflare Workers docs. https:\/\/developers.cloudflare.com\/workers\/learning\/security-model\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Kubernetes Contributors. 2023. Kubernetes Scheduler | Kubernetes. https:\/\/kubernetes.io\/docs\/concepts\/scheduling-eviction\/kube-scheduler\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Linux Contributors. 2023. Linux Source Code. https:\/\/github.com\/torvalds\/linux\/blob\/e62252bc55b6d4eddc6c2bdbf95a448180d6a08d\/arch\/x86\/kernel\/tsc.c."},{"key":"e_1_3_2_1_22_1","unstructured":"Memcached Contributors. 2018. memcached - a distributed memory object caching system. https:\/\/memcached.org\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Wikipedia Contributors. 2023. Pentium III - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Pentium_III."},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Corparation. Dec 2021. Intel 64 and IA-32 Architectures Software Developer's Manual. Combined Volumes."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037703"},{"key":"e_1_3_2_1_26_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Disselkoen Craig","year":"2017","unstructured":"Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean M. Tullsen. 2017. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16--18, 2017. USENIX Association, 51--67. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/disselkoen"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23149"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150982"},{"key":"e_1_3_2_1_30_1","unstructured":"Apache Software Foundation. 2023. Apache Cassandra | Apache Cassandra Documentation. https:\/\/cassandra.apache.org\/_\/index.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1983.10478008"},{"key":"e_1_3_2_1_32_1","unstructured":"Google. 2023. Google Docs. https:\/\/docs.google.com\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. USENIX Association, 955--972. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/gras"},{"key":"e_1_3_2_1_34_1","unstructured":"Brendan Gregg. 2021. The Speed of Time. https:\/\/www.brendangregg.com\/blog\/2021-09-26\/the-speed-of-time.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_36_1","unstructured":"gVisor Contributors. 2023. The Container Security Platform | gVisor. https:\/\/gvisor.dev\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505680"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056069"},{"key":"e_1_3_2_1_39_1","unstructured":"Advanced Micro Devices Inc. June 2023. AMD64 Architecture Programmer's Manual. Volumes 1--5."},{"key":"e_1_3_2_1_40_1","volume-title":"Docker: Accelerated, Containerized Application Development. https:\/\/www.docker.com\/.","author":"Docker Inc.","year":"2023","unstructured":"Docker Inc. 2023. Docker: Accelerated, Containerized Application Development. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_41_1","volume-title":"Thomas Eisenbarth, and Berk Sunar.","author":"\u0130nci Mehmet Sinan","year":"2015","unstructured":"Mehmet Sinan \u0130nci, Berk G\u00fclmezo\u011flu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. 2015. Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch. (2015), 898. http:\/\/eprint.iacr.org\/2015\/898"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2016.7581261"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.18"},{"key":"e_1_3_2_1_44_1","unstructured":"Redis Labs. 2022. Redis In-Memory Data Structure. https:\/\/redis.io."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853237"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00011"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5905"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0611-9"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In Cryptographers' track at the RSA conference. 1--20.","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_51_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. https:\/\/www.daemonology.net\/papers\/cachemissing.pdf."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.26"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939164"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_55_1","volume-title":"Introductory Statistics","author":"Ross Sheldon M","unstructured":"Sheldon M Ross. 2017. Introductory Statistics. Academic Press."},{"key":"e_1_3_2_1_56_1","volume-title":"Velocity Web Performance and Operations Conference. O'Reilly Media.","author":"Schurman Eric","year":"2009","unstructured":"Eric Schurman and Jake Brutlag. 2009. The user and business impact of server delays, additional bytes, and http chunking in web search. In Velocity Web Performance and Operations Conference. O'Reilly Media."},{"key":"e_1_3_2_1_57_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Tatar Andrei","year":"2022","unstructured":"Andrei Tatar, Dani\u00ebl Trujillo, Cristiano Giuffrida, and Herbert Bos. 2022. TLB;DR: Enhancing TLB-based Attacks with TLB Desyn-chronized Reverse Engineering. In 31st USENIX Security Symposium (USENIX Security 22). 989--1007."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Varadarajan Venkatanathan","year":"2014","unstructured":"Venkatanathan Varadarajan, Thomas Ristenpart, and Michael M. Swift. 2014. Scheduler-based Defenses against Cross-VM Side-channels. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 687--702. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/varadarajan"},{"key":"e_1_3_2_1_59_1","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Varadarajan Venkatanathan","year":"2015","unstructured":"Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael M. Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015. USENIX Association, 913--928. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan"},{"key":"e_1_3_2_1_60_1","volume-title":"Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics. In 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016","author":"Venkataraman Shivaram","year":"2016","unstructured":"Shivaram Venkataraman, Zongheng Yang, Michael J. Franklin, Benjamin Recht, and Ion Stoica. 2016. Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics. In 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, Santa Clara, CA, USA, March 16--18, 2016. USENIX Association, 363--378."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00042"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 21th USENIX Security Symposium","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8--10, 2012. USENIX Association, 159--173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu"},{"key":"e_1_3_2_1_63_1","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat inside the Cloud. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015. USENIX Association, 929--944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014. USENIX Association, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_2_1_66_1","volume-title":"RAID 2016, Paris, France, September 19--21, 2016, Proceedings 19","author":"Zhang Tianwei","year":"2016","unstructured":"Tianwei Zhang, Yinqian Zhang, and Ruby B Lee. 2016. CloudRadar: A real-time side-channel attack detection system in clouds. In Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19--21, 2016, Proceedings 19. Springer, 118--140."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617232.3624867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617232.3624867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:14Z","timestamp":1750178774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617232.3624867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":68,"alternative-id":["10.1145\/3617232.3624867","10.1145\/3617232"],"URL":"https:\/\/doi.org\/10.1145\/3617232.3624867","relation":{},"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}