{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:30:00Z","timestamp":1774449000641,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":111,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1942888"],"award-info":[{"award-number":["1942888"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1954521"],"award-info":[{"award-number":["1954521"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1956007"],"award-info":[{"award-number":["1956007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2154183"],"award-info":[{"award-number":["2154183"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["ACE"],"award-info":[{"award-number":["ACE"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640403","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"582-600","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7231-7416","authenticated-orcid":false,"given":"Zirui Neil","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5586-2615","authenticated-orcid":false,"given":"Adam","family":"Morrison","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-5995","authenticated-orcid":false,"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2595-5228","authenticated-orcid":false,"given":"Josep","family":"Torrellas","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417268"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Linux Symposium. 19--28","author":"Arcangeli Andrea","year":"2009","unstructured":"Andrea Arcangeli, Izik Eidus, and Chris Wright. 2009. Increasing memory density by using KSM. In Proceedings of the Linux Symposium. 19--28."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon AWS. 2022. The Security Design of the AWS Nitro System - AWS Whitepaper. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/security-design-of-aws-nitro-system\/security-design-of-aws-nitro-system.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon AWS. 2023. AWS Lambda - FAQs. https:\/\/aws.amazon.com\/lambda\/faqs\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Amazon AWS. 2023. Cloud Computing Services - Amazon Web Services (AWS). https:\/\/aws.amazon.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Amazon AWS. 2023. Secure and resizable cloud compute - Amazon EC2 - Amazon Web Services. https:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Amazon AWS. 2023. Serverless Computing - AWS Lambda - Amazon Web Services. https:\/\/aws.amazon.com\/lambda\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Microsoft Azure. 2023. Azure Functions - Serverless Functions in Computing | Microsoft Azure. https:\/\/azure.microsoft.com\/en-us\/products\/functions."},{"key":"e_1_3_2_1_9_1","unstructured":"Microsoft Azure. 2023. Azure Functions scale and hosting | Microsoft Learn. https:\/\/learn.microsoft.com\/en-us\/azure\/azure-functions\/functions-scale#timeout."},{"key":"e_1_3_2_1_10_1","unstructured":"Microsoft Azure. 2023. Cloud Computing Services | Microsoft Azure. https:\/\/azure.microsoft.com\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890799.1890803"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.46"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363194"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROSP51992.2021.00051"},{"key":"e_1_3_2_1_15_1","volume-title":"29th USENIX Security Symposium, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association","author":"Briongos Samira","year":"2020","unstructured":"Samira Briongos, Pedro Malag\u00f3n, Jos\u00e9 Manuel Moya, and Thomas Eisenbarth. 2020. RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. In 29th USENIX Security Symposium, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1967--1984. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/briongos"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00066"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10623-023-01269-7"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Cloud. 2023. Cloud Computing Services | Google Cloud. https:\/\/cloud.google.com\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Cloud Run: Container to production in seconds | Google Cloud. https:\/\/cloud.google.com\/run\/.","author":"Cloud Google","year":"2023","unstructured":"Google Cloud. 2023. Cloud Run: Container to production in seconds | Google Cloud. https:\/\/cloud.google.com\/run\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Google Cloud. 2023. Container runtime contract | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/container-contract."},{"key":"e_1_3_2_1_21_1","unstructured":"Google Cloud. 2023. Setting request timeout (services) | Cloud Run Documentation | Google Cloud. https:\/\/cloud.google.com\/run\/docs\/configuring\/request-timeout#setting."},{"key":"e_1_3_2_1_22_1","volume-title":"HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. In 29th USENIX Security Symposium, Srd-jan Capkun and Franziska Roesner (Eds.). USENIX Association, 451--468","author":"Dessouky Ghada","year":"2020","unstructured":"Ghada Dessouky, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2020. HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. In 29th USENIX Security Symposium, Srd-jan Capkun and Franziska Roesner (Eds.). USENIX Association, 451--468. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/dessouky"},{"key":"e_1_3_2_1_23_1","volume-title":"29th Annual Network and Distributed System Security Symposium (NDSS)","author":"Dessouky Ghada","unstructured":"Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, and Ahmad-Reza Sadeghi. 2022. Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. In 29th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/auto-draft-225\/"},{"key":"e_1_3_2_1_24_1","volume-title":"26th USENIX Security Symposium. USENIX Association, 51--67","author":"Disselkoen Craig","unstructured":"Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean M. Tullsen. 2017. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. In 26th USENIX Security Symposium. USENIX Association, 51--67. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/disselkoen"},{"key":"e_1_3_2_1_25_1","unstructured":"Catherine Easdon Michael Schwarz Martin Schwarzl and Daniel Gruss. 2022. GitHub - libtea\/frameworks. https:\/\/github.com\/libtea\/frameworks\/blob\/7af59e01\/libtea\/src\/libtea_cache_improved.c#L503."},{"key":"e_1_3_2_1_26_1","volume-title":"Rapid Prototyping for Microarchitectural Attacks. In 31st USENIX Security Symposium. USENIX Association, 3861--3877","author":"Easdon Catherine","year":"2022","unstructured":"Catherine Easdon, Michael Schwarz, Martin Schwarzl, and Daniel Gruss. 2022. Rapid Prototyping for Microarchitectural Attacks. In 31st USENIX Security Symposium. USENIX Association, 3861--3877. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/easdon"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978400"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507725"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_5"},{"key":"e_1_3_2_1_30_1","volume-title":"Translation Leak-Aside Buffer: Defeating Cache Side-Channel Protections with TLB Attacks. In 27th USENIX Security Symposium. USENIX Association, 955--972","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-Aside Buffer: Defeating Cache Side-Channel Protections with TLB Attacks. In 27th USENIX Security Symposium. USENIX Association, 955--972. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/gras"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_33_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In 24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 897--912","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In 24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 897--912. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/gruss"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00053"},{"key":"e_1_3_2_1_35_1","volume-title":"Two Steps Back. In 9th Biennial Conference on Innovative Data Systems Research (CIDR). www.cidrdb.org. http:\/\/cidrdb.org\/cidr2019\/papers\/p119-hellerstein-cidr19","author":"Hellerstein Joseph M.","year":"2019","unstructured":"Joseph M. Hellerstein, Jose M. Faleiro, Joseph Gonzalez, Johann Schleier-Smith, Vikram Sreekanti, Alexey Tumanov, and Chenggang Wu. 2019. Serverless Computing: One Step Forward, Two Steps Back. In 9th Biennial Conference on Innovative Data Systems Research (CIDR). www.cidrdb.org. http:\/\/cidrdb.org\/cidr2019\/papers\/p119-hellerstein-cidr19.pdf"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011214926272"},{"key":"e_1_3_2_1_38_1","volume-title":"Thomas Eisenbarth, and Berk Sunar.","author":"\u0130nci Mehmet Sinan","year":"2015","unstructured":"Mehmet Sinan \u0130nci, Berk G\u00fclmezo\u011flu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. 2015. Seriously, Get Off My Cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptology ePrint Archive (2015), 898. http:\/\/eprint.iacr.org\/2015\/898"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_18"},{"key":"e_1_3_2_1_40_1","unstructured":"Intel. 2023. PerfMon Event - Skylake-X Server Events. https:\/\/perfmon-events.intel.com\/skylake_server.html."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815971"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/S102070100002"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_22"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897962"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00083"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00082"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.72"},{"key":"e_1_3_2_1_50_1","unstructured":"Linux. 2022. Core Scheduling; The Linux Kernel Documentation. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/hw-vuln\/core-scheduling.html."},{"key":"e_1_3_2_1_51_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 549--564","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 549--564. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/lipp"},{"key":"e_1_3_2_1_52_1","unstructured":"Moritz Lipp Daniel Gruss Raphael Spreitzer Cl\u00e9mentine Maurice and Stefan Mangard. 2016. GitHub - IAIK\/armaged-don. https:\/\/github.com\/IAIK\/armageddon\/blob\/96ebc2d8\/libflush\/libflush\/eviction\/eviction.c#L266."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.28"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.85"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3113\/JSOA.2023.0259"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51938-4_18"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0611-9"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025436905711"},{"key":"e_1_3_2_1_62_1","unstructured":"OpenSSL. 2011. Montgomery Ladder Implementation of OpenSSL 1.0.1e. https:\/\/github.com\/openssl\/openssl\/blob\/46ebd9e3\/crypto\/ec\/ec2_mult.c#L268."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_65_1","volume-title":"30th USENIX Security Symposium, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 645--662","author":"Paccagnella Riccardo","unstructured":"Riccardo Paccagnella, Licheng Luo, and Christopher W. Fletcher. 2021. Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. In 30th USENIX Security Symposium, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 645--662. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/paccagnella"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_68_1","unstructured":"Colin Percival. 2005. Cache Missing for Fun and Profit. https:\/\/www.daemonology.net\/papers\/cachemissing.pdf."},{"key":"e_1_3_2_1_69_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium. USENIX Association, 565--581","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium. USENIX Association, 565--581. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00011"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484816"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322246"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250709"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00015"},{"key":"e_1_3_2_1_77_1","volume-title":"Qureshi","author":"Saileshwar Gururaj","year":"2021","unstructured":"Gururaj Saileshwar and Moinuddin K. Qureshi. 2021. MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. In 30th USENIX Security Symposium, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1379--1396. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/saileshwar"},{"key":"e_1_3_2_1_78_1","volume-title":"JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In 25th Annual Network and Distributed System Security Symposium (NDSS).","author":"Schwarz Michael","year":"2018","unstructured":"Michael Schwarz, Moritz Lipp, and Daniel Gruss. 2018. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In 25th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_79_1","volume-title":"Remote Memory-Deduplication Attacks. In 29th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society.","author":"Schwarzl Martin","year":"2022","unstructured":"Martin Schwarzl, Erik Kraft, Moritz Lipp, and Daniel Gruss. 2022. Remote Memory-Deduplication Attacks. In 29th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00050"},{"key":"e_1_3_2_1_81_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). USENIX Association, 427--442","author":"Song Wei","year":"2019","unstructured":"Wei Song and Peng Liu. 2019. Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). USENIX Association, 427--442. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/song"},{"key":"e_1_3_2_1_82_1","volume-title":"SPEC CPU2006 and CPU2017 Flag Description - Platform settings for New H3C systems. https:\/\/www.spec.org\/cpu2017\/flags\/New_H3C-Platform-Settings-V1.3-SKL-RevE.html.","author":"SPEC.","year":"2023","unstructured":"SPEC. 2023. SPEC CPU2006 and CPU2017 Flag Description - Platform settings for New H3C systems. https:\/\/www.spec.org\/cpu2017\/flags\/New_H3C-Platform-Settings-V1.3-SKL-RevE.html."},{"key":"e_1_3_2_1_83_1","volume-title":"Spectral Analysis of Signals","author":"Stoica Petre","unstructured":"Petre Stoica and Randolph Moses. 2005. Spectral Analysis of Signals. Vol. 452. Pearson Prentice Hall Upper Saddle River, NJ."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310170"},{"key":"e_1_3_2_1_85_1","volume-title":"PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. In 27th Annual Network and Distributed System Security Symposium (NDSS).","author":"Tan Qinhan","year":"2020","unstructured":"Qinhan Tan, Zhihua Zeng, Kai Bu, and Kui Ren. 2020. PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. In 27th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_86_1","volume-title":"31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 989--1007","author":"Tatar Andrei","year":"2022","unstructured":"Andrei Tatar, Dani\u00ebl Trujillo, Cristiano Giuffrida, and Herbert Bos. 2022. TLB;DR: Enhancing TLB-based Attacks with TLB Desyn-chronized Reverse Engineering. In 31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 989--1007. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/tatar"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387517"},{"key":"e_1_3_2_1_88_1","volume-title":"31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 2839--2856","author":"Townley Daniel","year":"2022","unstructured":"Daniel Townley, Kerem Arikan, Yu David Liu, Dmitry Ponomarev, and Oguz Ergin. 2022. Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks. In 31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 2839--2856. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/townley"},{"key":"e_1_3_2_1_89_1","volume-title":"24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 913--928","author":"Varadarajan Venkatanathan","unstructured":"Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael M. Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In 24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 913--928. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00042"},{"key":"e_1_3_2_1_91_1","volume-title":"Morales","author":"Vila Pepe","year":"2020","unstructured":"Pepe Vila, Boris K\u00f6pf, and Jos\u00e9 F. Morales. 2020. cgvwzq\/evsets: Tool for testing and finding minimal eviction sets. https:\/\/github.com\/cgvwzq\/evsets."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317877"},{"key":"e_1_3_2_1_93_1","volume-title":"Peeking Behind the Curtains of Server-less Platforms. In 2018 USENIX Annual Technical Conference (ATC), Haryadi S. Gunawi and Benjamin C. Reed (Eds.). USENIX Association, 133--146","author":"Wang Liang","unstructured":"Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, and Michael M. Swift. 2018. Peeking Behind the Curtains of Server-less Platforms. In 2018 USENIX Annual Technical Conference (ATC), Haryadi S. Gunawi and Benjamin C. Reed (Eds.). USENIX Association, 133--146. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/wang-liang"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898086"},{"key":"e_1_3_2_1_95_1","volume-title":"New Cache Designs for Thwarting Software Cache-Based Side Channel Attacks. In 34th Annual International Symposium on Computer Architecture (ISCA). ACM, 494--505","author":"Wang Zhenghong","unstructured":"Zhenghong Wang and Ruby B. Lee. 2007. New Cache Designs for Thwarting Software Cache-Based Side Channel Attacks. In 34th Annual International Symposium on Computer Architecture (ISCA). ACM, 494--505."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1967.1161901"},{"key":"e_1_3_2_1_97_1","volume-title":"28th USENIX Security Symposium. USENIX Association, 675--692","author":"Werner Mario","year":"2019","unstructured":"Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, and Stefan Mangard. 2019. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. In 28th USENIX Security Symposium. USENIX Association, 675--692. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/werner"},{"key":"e_1_3_2_1_98_1","unstructured":"Henry Wong. 2013. Intel Ivy Bridge Cache Replacement Policy. https:\/\/blog.stuffedcow.net\/2013\/01\/ivb-cache-replacement\/."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00021"},{"key":"e_1_3_2_1_100_1","volume-title":"24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 929--944","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat inside the Cloud. In 24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 929--944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607202"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"e_1_3_2_1_103_1","first-page":"140","article-title":"Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack","volume":"2014","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. IACR Cryptology ePrint Archive 2014 (2014), 140.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_104_1","volume-title":"23rd USENIX Security Symposium. USENIX Association, 719--732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX Security Symposium. USENIX Association, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483580"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_108_1","volume-title":"Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. In 31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 699--716","author":"Zhao Zirui Neil","year":"2022","unstructured":"Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, and Josep Torrellas. 2022. Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. In 31st USENIX Security Symposium, Kevin R. B. Butler and Kurt Thomas (Eds.). USENIX Association, 699--716. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/zhao-zirui"},{"key":"e_1_3_2_1_109_1","unstructured":"Zirui Neil Zhao Adam Morrison Christopher W. Fletcher and Josep Torrellas. 2023. GitHub - zzrcxb\/LLCFeasible. https:\/\/github.com\/zzrcxb\/LLCFeasible\/blob\/9bd94240\/libs\/cache\/evset.c#L459."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","unstructured":"Zirui Neil Zhao Adam Morrison Christopher W. Fletcher and Josep Torrellas. 2023. Untangle: A Principled Framework to Design Low-Leakage High-Performance Dynamic Partitioning Schemes. In 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) Tor M. Aamodt Natalie D. Enright Jerger and Michael M. Swift (Eds.). ACM 771--788. 10.1145\/3582016.3582033","DOI":"10.1145\/3582016.3582033"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617232.3624867"},{"key":"e_1_3_2_1_112_1","unstructured":"Zirui Neil Zhao Adam Morrison Christopher W. Fletcher and Josep Torrellas. 2024. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version). In arXiv."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3620665.3640403","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640403","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":111,"alternative-id":["10.1145\/3620665.3640403","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640403","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}