{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:16:50Z","timestamp":1773415010259,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690241","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4495-4508","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables"],"prefix":"10.1145","author":[{"given":"Zhibo","family":"Liu","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology Hong Kong, China"}]},{"given":"Yuanyuan","family":"Yuan","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology Hong Kong, China"}]},{"given":"Yanzuo","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology Hong Kong, China"}]},{"given":"Sihang","family":"Hu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Shenzhen, China"}]},{"given":"Tianxiang","family":"Li","sequence":"additional","affiliation":[{"name":"Huawei Technologies Shenzhen, China"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467174"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2023. Amazon SageMaker Neo. https:\/\/aws.amazon.com\/sagemaker\/neo\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2023. CPU Inference with Amazon EKS. https:\/\/docs.aws.amazon.com\/deep-learning-containers\/latest\/devguide\/deep-learning-containers-eks.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache. 2023. TVM. https:\/\/tvm.apache.org\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the linux symposium. Citeseer, 19--28","author":"Arcangeli Andrea","year":"2009","unstructured":"Andrea Arcangeli, Izik Eidus, and Chris Wright. 2009. Increasing memory density by using KSM. In Proceedings of the linux symposium. Citeseer, 19--28."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, 1--9.","author":"Fathy Atya Ahmed Osama","year":"2017","unstructured":"Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V Krishnamurthy, Thomas La Porta, Patrick McDaniel, and Lisa Marvel. 2017. Malicious co-residency on the cloud: Attacks and defense. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, 1--9."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2891528"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium. 515--532","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In Proceedings of the 28th USENIX Conference on Security Symposium. 515--532."},{"key":"e_1_3_2_1_10_1","volume-title":"Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.. In NDSS.","author":"Bauman Erick","year":"2018","unstructured":"Erick Bauman, Zhiqiang Lin, and Kevin W Hamlen. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.. In NDSS."},{"key":"e_1_3_2_1_11_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Briongos Samira","year":"2020","unstructured":"Samira Briongos, Pedro Malag\u00f3n, Jos\u00e9 M Moya, and Thomas Eisenbarth. 2020. RELOAD REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. In 29th USENIX Security Symposium (USENIX Security 20). 1967--1984."},{"key":"e_1_3_2_1_12_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Chen Tianqi","year":"2018","unstructured":"Tianqi Chen, Thierry Moreau, Ziheng Jiang, Lianmin Zheng, Eddie Yan, Haichen Shen, Meghan Cowan, Leyuan Wang, Yuwei Hu, Luis Ceze, et al. 2018. TVM: An automated End-to-End optimizing compiler for deep learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). 578--594."},{"key":"e_1_3_2_1_13_1","unstructured":"Google Cloud. 2023. Deep Learning VM Images. https:\/\/cloud.google.com\/deep-learning-vm\/docs\/images."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_15_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Disselkoen Craig","year":"2017","unstructured":"Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen. 2017. Prime Abort: A Timer-FreeHigh-Precision L3 Cache Attack using Intel TSX. In 26th USENIX Security Symposium (USENIX Security 17). 51--67."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300276"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2451633"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00250"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2022. PyTorch on Google Cloud. https:\/\/opensource.googleblog.com\/2022\/09\/accelerate-your-models-to-production-with-google-cloud-and-pytorch_0905763892.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833692"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831407.1831429"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00059"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_24_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)."},{"key":"e_1_3_2_1_25_1","unstructured":"Sanghyun Hong Michael Davinroy Yiugitcan Kaya Dana Dachman-Soled and Tudor Dumitracs. 2020. How to 0wn nas in your spare time. (2020)."},{"key":"e_1_3_2_1_26_1","volume-title":"Ian Rackow, Kevin Kulda, Dana Dachman-Soled, and Tudor Dumitracs.","author":"Hong Sanghyun","year":"2018","unstructured":"Sanghyun Hong, Michael Davinroy, Yiitcan Kaya, Stuart Nevans Locke, Ian Rackow, Kevin Kulda, Dana Dachman-Soled, and Tudor Dumitracs. 2018. Security analysis of deep neural networks operating in the presence of cache side-channel attacks. arXiv preprint arXiv:1810.03487 (2018)."},{"key":"e_1_3_2_1_27_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"e_1_3_2_1_29_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size. arXiv preprint arXiv:1602.07360","author":"Iandola Forrest N","year":"2016","unstructured":"Forrest N Iandola, Song Han, Matthew W Moskewicz, Khalid Ashraf, William J Dally, and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size. arXiv preprint arXiv:1602.07360 (2016)."},{"key":"e_1_3_2_1_30_1","volume-title":"Efficient execution of quantized deep learning models: A compiler approach. arXiv preprint arXiv:2006.10226","author":"Jain Animesh","year":"2020","unstructured":"Animesh Jain, Shoubhik Bhattacharya, Masahiro Masuda, Vin Sharma, and Yida Wang. 2020. Efficient execution of quantized deep learning models: A compiler approach. arXiv preprint arXiv:2006.10226 (2020)."},{"key":"e_1_3_2_1_31_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Katzman Daniel","year":"2023","unstructured":"Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, and Yuval Yarom. 2023. The gates of time: Improving cache attacks with transient execution. In 32nd USENIX Security Symposium (USENIX Security 23). 1955--1972."},{"key":"e_1_3_2_1_32_1","volume-title":"STEALTHMEM:System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Kim Taesoo","year":"2012","unstructured":"Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM:System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. In 21st USENIX Security Symposium (USENIX Security 12). 189--204."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_34_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, Vol. 25 (2012)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467075"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6819"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575707"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_27"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421356"},{"key":"e_1_3_2_1_42_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Liu Yizhi","year":"2019","unstructured":"Yizhi Liu, Yao Wang, Ruofei Yu, Mu Li, Vin Sharma, and Yida Wang. 2019. Optimizing CNN model inference on CPUs. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 1025--1040."},{"key":"e_1_3_2_1_43_1","unstructured":"Zhibo Liu Yuanyuan Yuan Shuai Wang Xiaofei Xie and Lei Ma. 2023. Decompiling x86 deep neural network executables. (2023)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_1_45_1","volume-title":"Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889","author":"Long Yunhui","year":"2018","unstructured":"Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A Gunter, and Kai Chen. 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 (2018)."},{"key":"e_1_3_2_1_46_1","volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices, Vol. 40, 6 (2005), 190--200."},{"key":"e_1_3_2_1_47_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Ma Lingxiao","year":"2020","unstructured":"Lingxiao Ma, Zhiqiang Xie, Zhi Yang, Jilong Xue, Youshan Miao, Wei Cui, Wenxiang Hu, Fan Yang, Lintao Zhang, and Lidong Zhou. 2020. Rammer: Enabling holistic deep learning compiler optimizations with rTasks. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 881--897."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813706"},{"key":"e_1_3_2_1_50_1","unstructured":"OctoML. 2023. OctoML Raises 85M Series C to Accelerate ML Deployment for Enterprises Everywhere. https:\/\/octoml.ai\/blog\/octoml-raises-usd85m-series-c\/."},{"key":"e_1_3_2_1_51_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party machine learning on trusted processors. In 25th USENIX Security Symposium (USENIX Security 16). 619--636."},{"key":"e_1_3_2_1_52_1","unstructured":"ONNX. 2023. ONNX Zoo. https:\/\/github.com\/onnx\/models."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484816"},{"key":"e_1_3_2_1_55_1","unstructured":"PyTorch. 2023. PyTorch 2.x: faster more pythonic and as dynamic as ever. https:\/\/pytorch.org\/get-started\/pytorch-2.0\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_58_1","volume-title":"Glow: Graph lowering compiler techniques for neural networks. arXiv preprint arXiv:1805.00907","author":"Rotem Nadav","year":"2018","unstructured":"Nadav Rotem, Jordan Fix, Saleem Abdulrasool, Garret Catron, Summer Deng, Roman Dzhabarov, Nick Gibson, James Hegeman, Meghan Lele, Roman Levenstein, et al. 2018. Glow: Graph lowering compiler techniques for neural networks. arXiv preprint arXiv:1805.00907 (2018)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17152"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00037"},{"key":"e_1_3_2_1_61_1","volume-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting. Advances in neural information processing systems","author":"Shi Xingjian","year":"2015","unstructured":"Xingjian Shi, Zhourong Chen, Hao Wang, Dit-Yan Yeung, Wai-Kin Wong, and Wang-chun Woo. 2015. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. Advances in neural information processing systems, Vol. 28 (2015)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_63_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_64_1","volume-title":"The case for running AI on CPUs isnt dead yet","author":"Smith M","year":"2023","unstructured":"M Smith. 2023. The case for running AI on CPUs isnt dead yet. IEEE Spectrum, Vol. 1 (2023)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_44"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings 18","author":"Stefan Deian","year":"2013","unstructured":"Deian Stefan, Pablo Buiras, Edward Z Yang, Amit Levy, David Terei, Alejandro Russo, and David Mazi\u00e8res. 2013. Eliminating cache-based timing attacks with instruction-based scheduling. In Computer Security--ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9--13, 2013. Proceedings 18. Springer, 718--735."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_1_68_1","volume-title":"25th USENIX security symposium (USENIX Security 16). 601--618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction APIs. In 25th USENIX security symposium (USENIX Security 16). 601--618."},{"key":"e_1_3_2_1_69_1","unstructured":"Apache TVM. 2023. Design and Architecture. https:\/\/tvm.apache.org\/docs\/arch\/index.html."},{"key":"e_1_3_2_1_70_1","volume-title":"23rd USENIX security symposium (USENIX security 14). 687--702.","author":"Varadarajan Venkatanathan","unstructured":"Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift. 2014. Scheduler-based defenses against Cross-VM side-channels. In 23rd USENIX security symposium (USENIX security 14). 687--702."},{"key":"e_1_3_2_1_71_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Varadarajan Venkatanathan","year":"2015","unstructured":"Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In 24th USENIX Security Symposium (USENIX Security 15). 913--928."},{"key":"e_1_3_2_1_72_1","volume-title":"Ramblr: Making Reassembly Great Again.. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again.. In NDSS."},{"key":"e_1_3_2_1_73_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable disassembling. In 24th USENIX Security Symposium (USENIX Security 15). 627--642."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_75_1","volume-title":"Antonio Bianchi, and Dongyan Xu.","author":"Wu Ruoyu","year":"2022","unstructured":"Ruoyu Wu, Taegyu Kim, Dave Jing Tian, Antonio Bianchi, and Dongyan Xu. 2022. DnD: A Cross-Architecture deep neural network decompiler. In USENIX Security 22. 2135--2152."},{"key":"e_1_3_2_1_76_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A measurement study on co-residence threat inside the cloud. In 24th USENIX Security Symposium (USENIX Security 15). 929--944."},{"key":"e_1_3_2_1_77_1","unstructured":"Mengjia Yan Christopher W Fletcher and Josep Torrellas. [n. d.]. Cache telepathy: Leveraging shared resource attacks to learn DNN architectures. In USENIX Sec'20."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575738"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.28"},{"key":"e_1_3_2_1_80_1","volume-title":"Mastik: A micro-architectural side-channel toolkit.","author":"Yarom Yuval","year":"2016","unstructured":"Yuval Yarom. 2016. Mastik: A micro-architectural side-channel toolkit."},{"key":"e_1_3_2_1_81_1","volume-title":"FLUSH RELOAD: A high resolution, low noise, l3 cache Side-Channel attack. In USENIX security 14. 719--732.","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH RELOAD: A high resolution, low noise, l3 cache Side-Channel attack. In USENIX security 14. 719--732."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00874"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"e_1_3_2_1_84_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yu Jiyong","year":"2023","unstructured":"Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, and Christopher W Fletcher. 2023. Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. In 32nd USENIX Security Symposium (USENIX Security 23). 1973--1990."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2346504"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2010.17"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"e_1_3_2_1_88_1","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 827--838","author":"Zhang Yinqian","year":"2013","unstructured":"Yinqian Zhang and Michael K Reiter. 2013. D\u00fcppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 827--838."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978324"},{"key":"e_1_3_2_1_90_1","volume-title":"Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. In USENIX Security.","author":"Zhu Yuankun","year":"2021","unstructured":"Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, and Yantao Lu. 2021. Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. In USENIX Security."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:06:23Z","timestamp":1755842783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":90,"alternative-id":["10.1145\/3658644.3690241","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690241","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}