{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:13Z","timestamp":1772725573424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS- 1954521, CNS-1942888, CNS-2154183, CCF-8191902"],"award-info":[{"award-number":["CNS- 1954521, CNS-1942888, CNS-2154183, CCF-8191902"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3676641.3715985","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:47:32Z","timestamp":1743094052000},"page":"162-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Controlled Preemption: Amplifying Side-Channel Attacks from Userspace"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6191-8187","authenticated-orcid":false,"given":"Yongye","family":"Zhu","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8024-1116","authenticated-orcid":false,"given":"Boru","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7231-7416","authenticated-orcid":false,"given":"Zirui Neil","family":"Zhao","sequence":"additional","affiliation":[{"name":"NVIDIA, Westford, MA, USA and The University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-5995","authenticated-orcid":false,"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Indirect Branch Predictor Barrier. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-predictor-barrier.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Arm Armv8-A Architecture Registers. https:\/\/developer.arm.com\/documentation\/ddi0595\/2021-12."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Intel\u00ae Processors Load Value Injection Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00334.html."},{"key":"e_1_3_2_1_4_1","volume-title":"Portable, Easy to Use","unstructured":"2022. Mbed-TLS: An Open Source, Portable, Easy to Use, Readable and Flexible SSL Library. https:\/\/github.com\/Mbed-TLS\/mbedtls."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Data Operand Independent Timing Instruction Set Architecture (ISA) Guidance. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/best-practices\/data-operand-independent-timing-isa-guidance.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. eBPF - Introduction Tutorials & Community Resources. https:\/\/ebpf.io\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2025. About instance autoscaling in Cloud Run services. https:\/\/cloud.google.com\/run\/docs\/about-instance-autoscaling."},{"key":"e_1_3_2_1_8_1","volume-title":"Port Contention for Fun and Profit. In IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Aldaya Alejandro Cabrera","year":"2019","unstructured":"Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\u00eda, and Nicola Tuveri. 2019. Port Contention for Fun and Profit. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_9_1","volume-title":"Annual Conference on Computer Security Applications (ACSAC).","author":"Allan Thomas","unstructured":"Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, and Yuval Yarom. 2016. Amplifying Side Channels through Performance Degradation. In Annual Conference on Computer Security Applications (ACSAC)."},{"key":"e_1_3_2_1_10_1","volume-title":"Verifying Constant-Time Implementations. In USENIX Security Symposium (USENIX Security).","author":"Almeida Jose Bacelar","year":"2016","unstructured":"Jose Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Franc cois Dupressoir, and Michael Emmi. 2016. Verifying Constant-Time Implementations. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_11_1","volume-title":"Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. In IEEE European Symposium on Security and Privacy (EuroS&P).","author":"Ashokkumar C.","year":"2016","unstructured":"C. Ashokkumar, Ravi Prakash Giri, and Bernard Menezes. 2016. Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. In IEEE European Symposium on Security and Privacy (EuroS&P)."},{"key":"e_1_3_2_1_12_1","volume-title":"M Bhargav Sri Venkatesh, and Bernard L Menezes","author":"Ashokkumar C","year":"2018","unstructured":"C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, and Bernard L Menezes. 2018. ''S-Box'' Implementation of AES is NOT Side-channel Resistant. https:\/\/ia.cr\/2018\/1002"},{"key":"e_1_3_2_1_13_1","volume-title":"System-level Non-interference for Constant-time Cryptography. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Barthe Gilles","year":"2014","unstructured":"Gilles Barthe, Gustavo Betarte, Juan Campo, Carlos Luna, and David Pichardie. 2014. System-level Non-interference for Constant-time Cryptography. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00031"},{"key":"e_1_3_2_1_15_1","volume-title":"GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. In USENIX Security Symposium (USENIX Security).","author":"Chen Boru","year":"2024","unstructured":"Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, and Daniel Genkin. 2024. GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Constable Scott","year":"2023","unstructured":"Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, and Mark Silberstein. 2023. AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_17_1","unstructured":"Jonathan Corbet. 2023. An EEVDF CPU Scheduler for Linux. https:\/\/lwn.net\/Articles\/925371\/."},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Dai Miles","year":"2022","unstructured":"Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John McCalpin, and Mengjia Yan. 2022. Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Disselkoen Craig","year":"2017","unstructured":"Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen. 2017. PrimeAbort: A Timer-Free High-Precision L3 Cache Attack Using Intel TSX. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303976"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Daniel Genkin Lev Pachmanov Itamar Pipman and Eran Tromer. 2015. Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. In Cryptographic Hardware and Embedded Systems (CHES).","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_24_1","volume-title":"International Cryptology Conference (CRYPTO).","author":"Genkin Daniel","year":"2013","unstructured":"Daniel Genkin, Adi Shamir, and Eran Tromer. 2013. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. In International Cryptology Conference (CRYPTO)."},{"key":"e_1_3_2_1_25_1","volume-title":"Translation Leak-Aside Buffer: Defeating Cache Side-Channel Protections with TLB Attacks. In USENIX Security Symposium (USENIX Security).","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-Aside Buffer: Defeating Cache Side-Channel Protections with TLB Attacks. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016. FlushFlush: A Fast and Stealthy Cache Attack. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_27_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security Symposium (USENIX Security).","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_29_1","volume-title":"High-Resolution Side Channels for Untrusted Operating Systems. In USENIX Annual Technical Conference (USENIX ATC).","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690313"},{"key":"e_1_3_2_1_31_1","volume-title":"Reducing Timing Channels with Fuzzy Time. Journal of computer security","author":"Wei-Ming Hu.","year":"1992","unstructured":"Wei-Ming Hu. 1992. Reducing Timing Channels with Fuzzy Time. Journal of computer security (1992)."},{"key":"e_1_3_2_1_32_1","volume-title":"Thomas Eisenbarth, and Berk Sunar.","author":"\u0130nci Mehmet Sinan","year":"2016","unstructured":"Mehmet Sinan \u0130nci, Berk G\u00fclmezo\u011flu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud. In Cryptographic Hardware and Embedded Systems (CHES)."},{"key":"e_1_3_2_1_33_1","volume-title":"A Complete Guide to Linux Process Scheduling. Master's thesis","author":"Ishkov Nikita","unstructured":"Nikita Ishkov. 2015. A Complete Guide to Linux Process Scheduling. Master's thesis. University of Tampere."},{"key":"e_1_3_2_1_34_1","volume-title":"The Gates of Time: Improving Cache Attacks with Transient Execution. In USENIX Security Symposium (USENIX Security).","author":"Katzman Daniel","year":"2023","unstructured":"Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, and Yuval Yarom. 2023. The Gates of Time: Improving Cache Attacks with Transient Execution. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_35_1","volume-title":"DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In IEEE\/ACM International Symposium on Microarchitecture (MICRO).","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, and Joel Emer. 2018. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In IEEE\/ACM International Symposium on Microarchitecture (MICRO)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_37_1","volume-title":"Trusted Browsers for Uncertain Times. In USENIX Security Symposium (USENIX Security).","author":"Kohlbrenner David","year":"2016","unstructured":"David Kohlbrenner and Hovav Shacham. 2016. Trusted Browsers for Uncertain Times. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Kwong Andrew","year":"2023","unstructured":"Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, and Yuval Yarom. 2023. Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_39_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium (USENIX Security).","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_40_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium (USENIX Security).","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_41_1","volume-title":"International Symposium on High-Performance Computer Architecture (HPCA).","author":"Liu Fangfei","unstructured":"Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser, and Ruby B. Lee. 2016. CATalyst: Defeating last-level cache side channel attacks in cloud computing. In International Symposium on High-Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_1_42_1","volume-title":"IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Liu Fangfei","unstructured":"Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_43_1","unstructured":"Ross Mcilroy Jaroslav Sevcik Tobias Tebbi Ben L. Titzer and Toon Verwaest. 2019. Spectre is here to stay: An analysis of side-channels and speculative execution. https:\/\/arxiv.org\/abs\/1902.05178"},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Merget Robert","year":"2021","unstructured":"Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, and J\u00f6rg Schwenk. 2021. Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Ahmad Moghimi Gorka Irazoqui and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In Cryptographic Hardware and Embedded Systems (CHES).","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_46_1","volume-title":"The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In USENIX Security Symposium (USENIX Security).","author":"Molnar David","year":"2005","unstructured":"David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_47_1","unstructured":"Ingo Molnar. 2007. sched-design-CFS.txt. https:\/\/www.kernel.org\/doc\/Documentation\/scheduler\/sched-design-CFS.txt."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Dag Arne Osvik Adi Shamir and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In The Cryptographers' Track at the RSA Conference (CT-RSA).","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Paccagnella Riccardo","unstructured":"Riccardo Paccagnella, Licheng Luo, and Christopher W. Fletcher. 2021. Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_50_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Garc\u00eda Cesar Pereida","year":"2016","unstructured":"Cesar Pereida Garc\u00eda, Billy Bob Brumley, and Yuval Yarom. 2016. ''Make Sure DSA Signing Exponentiations Really are Constant-Time''. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Puddu Ivan","year":"2021","unstructured":"Ivan Puddu, Moritz Schneider, Miro Haller, and Srdjan Capkun. 2021. Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_52_1","volume-title":"PrimeScope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Purnal Antoon","year":"2021","unstructured":"Antoon Purnal, Furkan Turan, and Ingrid Verbauwhede. 2021. PrimeScope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_53_1","volume-title":"Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Ristenpart Thomas","year":"2009","unstructured":"Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005576804410447"},{"key":"e_1_3_2_1_55_1","volume-title":"FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Schl\u00fcter Till","year":"2023","unstructured":"Till Schl\u00fcter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, and Nils Ole Tippenhauer. 2023. FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_56_1","volume-title":"JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In Network and Distributed System Security Symposium (NDSS).","author":"Schwarz Michael","year":"2018","unstructured":"Michael Schwarz, Moritz Lipp, and Daniel Gruss. 2018. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484783"},{"key":"e_1_3_2_1_58_1","unstructured":"I. Stoica and H. Abdel-Wahab. 1995. Earliest Eligible Virtual Deadline First: A Flexible and Accurate Mechanism for Proportional Share Resource Allocation. https:\/\/people.eecs.berkeley.edu\/ istoica\/papers\/eevdf-tr-95.pdf"},{"key":"e_1_3_2_1_59_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Tatar Andrei","year":"2022","unstructured":"Andrei Tatar, Dani\u00ebl Trujillo, Cristiano Giuffrida, and Herbert Bos. 2022. TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_60_1","volume-title":"IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lippi, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens. 2020. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_61_1","volume-title":"SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves. In Annual Conference on Computer Security Applications (ACSAC).","author":"Bulck Jo Van","year":"2023","unstructured":"Jo Van Bulck and Frank Piessens. 2023. SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves. In Annual Conference on Computer Security Applications (ACSAC)."},{"key":"e_1_3_2_1_62_1","volume-title":"SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. In Workshop on System Software for Trusted Execution (SysTEX).","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2017. SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. In Workshop on System Software for Trusted Execution (SysTEX)."},{"key":"e_1_3_2_1_63_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Varadarajan Venkatanathan","year":"2014","unstructured":"Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift. 2014. Scheduler-based Defenses against Cross-VM Side-channels. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046671"},{"key":"e_1_3_2_1_65_1","volume-title":"MeshUp: Stateless Cache Side-channel Attack on CPU Mesh. In IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Wan Junpeng","year":"2022","unstructured":"Junpeng Wan, Yanxiang Bi, Zhe Zhou, and Zhou Li. 2022. MeshUp: Stateless Cache Side-channel Attack on CPU Mesh. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00023"},{"key":"e_1_3_2_1_67_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, and David Kohlbrenner. 2022. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179326"},{"key":"e_1_3_2_1_69_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Wang Zixuan","year":"2023","unstructured":"Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, and Jishen Zhao. 2023b. NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_70_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_71_1","unstructured":"Wei Xu. 2024. Deep into Linux and Beyond. https:\/\/wxdublin.gitbooks.io\/deep-into-linux-and-beyond\/content\/cfs_internals.html."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00004"},{"key":"e_1_3_2_1_73_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSHRELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_74_1","volume-title":"CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Journal of Cryptographic Engineering","author":"Yarom Yuval","year":"2016","unstructured":"Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Journal of Cryptographic Engineering (2016)."},{"key":"e_1_3_2_1_75_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Yu Jiyong","year":"2023","unstructured":"Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, and Christopher W Fletcher. 2023a. Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_76_1","volume-title":"Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In Network and Distributed System Security Symposium (NDSS).","author":"Yu Jiyong","unstructured":"Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, and Christopher W. Fletcher. 2018. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589100"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_79_1","volume-title":"BunnyHop: Exploiting the Instruction Prefetcher. In USENIX Security Symposium (USENIX Security).","author":"Zhang Zhiyuan","year":"2023","unstructured":"Zhiyuan Zhang, Mingtian Tao, Sioli OtextquoterightConnell, Chitchanok Chuengsatiansup, Daniel Genkin, and Yuval Yarom. 2023. BunnyHop: Exploiting the Instruction Prefetcher. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_80_1","volume-title":"High-performance Dynamic Partitioning Schemes. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).","author":"Zhao Zirui Neil","year":"2023","unstructured":"Zirui Neil Zhao, Adam Morrison, Christopher W Fletcher, and Josep Torrellas. 2023. Untangle: A Principled Framework to Design Low-leakage, High-performance Dynamic Partitioning Schemes. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)."},{"key":"e_1_3_2_1_81_1","volume-title":"Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).","author":"Zhao Zirui Neil","year":"2024","unstructured":"Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, and Josep Torrellas. 2024. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)."}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3715985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676641.3715985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:12:59Z","timestamp":1755774779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3715985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":81,"alternative-id":["10.1145\/3676641.3715985","10.1145\/3676641"],"URL":"https:\/\/doi.org\/10.1145\/3676641.3715985","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}