{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:25:00Z","timestamp":1773156300706,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3676838","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["\u00b5LAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0106-3638","authenticated-orcid":false,"given":"Upasana","family":"Mandal","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering, Indian Institute of Technology Kharagpur, Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0452-885X","authenticated-orcid":false,"given":"Shubhi","family":"Shukla","sequence":"additional","affiliation":[{"name":"Centre for Computational and Data Sciences, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0178-8109","authenticated-orcid":false,"given":"Ayushi","family":"Rastogi","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4190-2671","authenticated-orcid":false,"given":"Sarani","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6499-8346","authenticated-orcid":false,"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Topics in Cryptology-CT-RSA 2007: The Cryptographers' Track at the RSA Conference","author":"Ac\u0131i\u00e7mez Onur","year":"2007","unstructured":"Onur Ac\u0131i\u00e7mez, \u00c7etin Kaya Ko\u00e7, and Jean-Pierre Seifert. 2006. Predicting secret keys via branch prediction. In Topics in Cryptology-CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5--9, 2007. Proceedings. Springer, 225--242."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439189","article-title":"Victims can be saviors: a machine learning-based detection for micro-architectural side-channel attacks","volume":"17","author":"Alam Manaar","year":"2021","unstructured":"Manaar Alam, Sarani Bhattacharya, and Debdeep Mukhopadhyay. 2021. Victims can be saviors: a machine learning-based detection for micro-architectural side-channel attacks. ACM Journal on Emerging Technologies in Computing Systems (JETC), 17, 2, 1--31.","journal-title":"ACM Journal on Emerging Technologies in Computing Systems (JETC)"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Information Technology and Communications Security. Springer, 51--64","author":"B\u0103lucea Ruxandra","year":"2023","unstructured":"Ruxandra B\u0103lucea and Paul Irofti. 2023. Software mitigation of risc-v spectre attacks. In International Conference on Information Technology and Communications Security. Springer, 51--64."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings 8. Springer, 201--215","author":"Bonneau Joseph","year":"2006","unstructured":"Joseph Bonneau and Ilya Mironov. 2006. Cache-collision timing attacks against aes. In Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International Workshop, Yokohama, Japan, October 10--13, 2006. Proceedings 8. Springer, 201--215."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484583"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176320"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641289"},{"key":"e_1_3_2_1_8_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation leak-aside buffer: defeating cache side-channel protections with {tlb} attacks. In 27th USENIX Security Symposium (USENIX Security 18), 955--972."},{"key":"e_1_3_2_1_9_1","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice and Klaus Wagner. 2015. Flush+flush: A stealthier last-level cache attack. CoRR abs\/1511.04594. http:\/\/arxiv.org\/abs\/1511.04594 arXiv: 1511.04594."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176316"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Marc Joye and Michael Tunstall. 2007. Securing openssl against micro-architectural attacks. In SECRYPT 189--196.","DOI":"10.5220\/0002118801890196"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_16_1","unstructured":"William Kosasih Yusi Feng Chitchanok Chuengsatiansup Yuval Yarom and Ziyuan Zhu. [n. d.] Sok: can we really detect cache side-channel attacks by monitoring performance counters?"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00014"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783741"},{"key":"e_1_3_2_1_19_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Moritz","year":"2018","unstructured":"Moritz Lipp et al. 2018. Meltdown: reading kernel memory from user space. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. William Enck and Adrienne Porter Felt, (Eds.) USENIX Association, 973--990. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_22_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Moritz Lipp, Berk Sunar, and Michael Schwarz. 2020. Medusa: microarchitectural data leakage via automated attack synthesis. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020. Srdjan Capkun and Franziska Roesner, (Eds.) USENIX Association, 1427--1444. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/moghimi-medusa."},{"key":"e_1_3_2_1_23_1","unstructured":"OpenAI. 2022. ChatGPT. https:\/\/openai.com\/chatgpt. Version 3.5. (2022)."},{"key":"e_1_3_2_1_24_1","volume-title":"25th USENIX security symposium (USENIX security 16), 565--581.","author":"Pessl Peter","unstructured":"Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. {Drama}: exploiting {dram} addressing for {cross-cpu} attacks. In 25th USENIX security symposium (USENIX security 16), 565--581."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5559552"},{"key":"e_1_3_2_1_27_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA. Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett, (Eds.), 5998--6008. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Wenjie Xiong and Jakub Szefer. 2022. Survey of transient execution attacks and their mitigations. ACM Comput. Surv. 54 3 54:1--54:36. 10.1145\/3442479","DOI":"10.1145\/3442479"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014. Kevin Fu and Jaeyeon Jung, (Eds.) USENIX Association, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Jiliang Zhang Congcong Chen Jinhua Cui and Keqin Li. 2024. Timing side-channel attacks and countermeasures in cpu microarchitectures. ACM Computing Surveys.","DOI":"10.1145\/3645109"}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"]},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3676838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:45Z","timestamp":1750295925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":30,"alternative-id":["10.1145\/3676536.3676838","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3676838","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}