{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:58:51Z","timestamp":1764053931543,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2022R1C1C101049"],"award-info":[{"award-number":["NRF-2022R1C1C101049"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["No. 2022-0-00688, No. 2022-0-01199, RS-2024-00437306, and RS-2024-00439819"],"award-info":[{"award-number":["No. 2022-0-00688, No. 2022-0-01199, RS-2024-00437306, and RS-2024-00439819"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690340","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2993-3007","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["<i>u<\/i>\n            MMU: Securing Data Confidentiality with Unobservable Memory Subsystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1092-7347","authenticated-orcid":false,"given":"Hajeong","family":"Lim","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7766-9654","authenticated-orcid":false,"given":"Jaeyoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-6266","authenticated-orcid":false,"given":"Hojoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012. LLVM. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. The Heartbleed Bug. https:\/\/heartbleed.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. x86 psABIs. https:\/\/gitlab.com\/x86-psABIs\/x86--64-ABI"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"key":"e_1_3_2_1_5_1","volume-title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX","author":"Ahmad Adil","year":"2019","unstructured":"Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee. 2019. OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23284"},{"key":"e_1_3_2_1_7_1","volume-title":"Arm TrustZone Technology. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone. Last accessed Apr 2","author":"ARM.","year":"2024","unstructured":"ARM. 2024. Arm TrustZone Technology. https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone. Last accessed Apr 2 , 2024,."},{"key":"e_1_3_2_1_8_1","volume-title":"Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. In CCS. ACM, 715--733.","author":"Borrello Pietro","year":"2021","unstructured":"Pietro Borrello, Daniele Cono D?Elia, Leonardo Querzoni, and Cristiano Giuffrida. 2021. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. In CCS. ACM, 715--733."},{"key":"e_1_3_2_1_9_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser"},{"key":"e_1_3_2_1_10_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 991--1008. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bulck"},{"key":"e_1_3_2_1_11_1","volume-title":"Carr and Mathias Payer","author":"Scott","year":"2017","unstructured":"Scott A. Carr and Mathias Payer. 2017. DataShield: Configurable Data Confidentiality and Integrity. In AsiaCCS. ACM, 193--204."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_13_1","unstructured":"Data Differential. 2011. libmemcached. https:\/\/libmemcached.org\/libMemcached.html."},{"key":"e_1_3_2_1_14_1","unstructured":"Dormando. 2018. memcached - a distributed memory object caching system. https:\/\/memcached.org."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173204"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523656"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_20_1","volume-title":"ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices","author":"G\u00f6tzfried Johannes","year":"2013","unstructured":"Johannes G\u00f6tzfried and Tilo M\u00fcller. 2013. ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. In ARES. IEEE Computer Society, 161--168."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897924"},{"key":"e_1_3_2_1_22_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 897--912. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/gruss"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23125"},{"key":"e_1_3_2_1_24_1","volume-title":"High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA, 299--312. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/hahnel"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i1.321--347"},{"key":"e_1_3_2_1_26_1","unstructured":"Intel Corporation. 2024. Intel\u00ae 64 and IA-32 Architectures Software Developer?s Manual. Number 325462-083US."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"e_1_3_2_1_28_1","unstructured":"David Kaplan. [n. d.]. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. ([n. d.])."},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"A high-resolution side-channel attack on last-level cache","volume":"72","author":"Kayaalp Mehmet","year":"2016","unstructured":"Mehmet Kayaalp, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev, and Aamer Jaleel. 2016. A high-resolution side-channel attack on last-level cache. In DAC. ACM, 72:1--72:6.","journal-title":"DAC. ACM"},{"key":"e_1_3_2_1_30_1","volume-title":"PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Kim Taegyu","year":"2021","unstructured":"Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, and Dave (Jing) Tian. 2021. PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 249--266. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/kim"},{"key":"e_1_3_2_1_31_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. IEEE, 1--19","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy. IEEE, 1--19."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_33_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-che Tsai, and Raluca Ada Popa. 2020. An Off-Chip Attack on Hardware Enclaves via the Memory Bus. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 487--504. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/lee-dayeol"},{"key":"e_1_3_2_1_34_1","volume-title":"DOVE: A Data-Oblivious Virtual Environment. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Lee Hyun Bin","year":"2021","unstructured":"Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, and Carl A. Gunter. 2021. DOVE: A Data-Oblivious Virtual Environment. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021. https:\/\/www.ndss-symposium.org\/ndss-paper\/dove-a-data-oblivious-virtual-environment\/"},{"key":"e_1_3_2_1_35_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 557--574. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/lee-sangho"},{"key":"e_1_3_2_1_36_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 717--732. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-mengyuan"},{"key":"e_1_3_2_1_37_1","unstructured":"Linaro Limited. 2024. Mbed TLS. https:\/\/www.trustedfirmware.org\/projects\/mbed-tls\/."},{"key":"e_1_3_2_1_38_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.11"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380325"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_44_1","volume-title":"Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 279--296","author":"Mishra Pratyush","year":"2018","unstructured":"Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. 2018. Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 279--296."},{"key":"e_1_3_2_1_45_1","volume-title":"Wagner","author":"Molnar David","year":"2005","unstructured":"David Molnar, Matt Piotrowski, David Schultz, and David A. Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In ICISC (Lecture Notes in Computer Science, Vol. 3935). Springer, 156--168."},{"key":"e_1_3_2_1_46_1","volume-title":"TRESOR Runs Encryption Securely Outside RAM. In 20th USENIX Security Symposium (USENIX Security 11)","author":"M\u00fcller Tilo","year":"2011","unstructured":"Tilo M\u00fcller, Felix C. Freiling, and Andreas Dewald. 2011. TRESOR Runs Encryption Securely Outside RAM. In 20th USENIX Security Symposium (USENIX Security 11). USENIX Association, San Francisco, CA. https:\/\/www.usenix.org\/conference\/usenix-security-11\/tresor-runs-encryption-securely-outside-ram"},{"key":"e_1_3_2_1_47_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_1_49_1","volume-title":"CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Orenbach Meni","year":"2019","unstructured":"Meni Orenbach, Yan Michalevsky, Christof Fetzer, and Mark Silberstein. 2019. CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 555--570. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/orenbach"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00082"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359815"},{"key":"e_1_3_2_1_53_1","volume-title":"USENIX Security Symposium. USENIX Association, 431--446","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security Symposium. USENIX Association, 431--446."},{"key":"e_1_3_2_1_54_1","unstructured":"Ling Ren Christopher W. Fletcher Albert Kwon Emil Stefanov Elaine Shi Marten van Dijk and Srinivas Devadas. 2014. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptol. ePrint Arch. (2014) 997. http:\/\/eprint.iacr.org\/2014\/997"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485971"},{"key":"e_1_3_2_1_56_1","volume-title":"Fletcher","author":"Sasy Sajin","year":"2018","unstructured":"Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace : Oblivious Memory Primitives from Intel SGX. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Patrick Simmons. 2011. Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In ACSAC. ACM 73--82.","DOI":"10.1145\/2076732.2076743"},{"key":"e_1_3_2_1_59_1","volume-title":"ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Son Jeongseok","year":"2021","unstructured":"Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, and Koushik Sen. 2021. ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State. In 30th USENIX Security Symposium, USENIX Security 2021, August 11--13, 2021, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 2219--2236. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/son"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_62_1","unstructured":"thi.ng. 2017. tinyalloc. https:\/\/github.com\/thi-ng\/tinyalloc."},{"key":"e_1_3_2_1_63_1","unstructured":"Shruti Tople Yaoqi Jia and Prateek Saxena. 2018. PRO-ORAM: Constant Latency Read-Only Oblivious RAM. IACR Cryptol. ePrint Arch. (2018) 220. http:\/\/eprint.iacr.org\/2018\/220"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_1_69_1","volume-title":"Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. In 32nd USENIX Security Symposium, USENIX Security 2023","author":"Wichelmann Jan","year":"2023","unstructured":"Jan Wichelmann, Anna P\u00e4tschke, Luca Wilke, and Thomas Eisenbarth. 2023. Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9--11, 2023, Joseph A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 6789--6806. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/wichelmann"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530549"},{"key":"e_1_3_2_1_71_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSHRELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589100"},{"key":"e_1_3_2_1_73_1","volume-title":"Ginseng: Keeping Secrets in Registers When You Distrust the Operating System","author":"Yun Min Hong","year":"2019","unstructured":"Min Hong Yun and Lin Zhong. 2019. Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.13"},{"key":"e_1_3_2_1_75_1","volume-title":"Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. In ASPLOS. ACM, 1263--1276.","author":"Zhang Pan","year":"2020","unstructured":"Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, and Hai Jin. 2020. Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. In ASPLOS. ACM, 1263--1276."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830787"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690340","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:10:44Z","timestamp":1755843044000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":76,"alternative-id":["10.1145\/3658644.3690340","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690340","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}