{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:36Z","timestamp":1755225216872,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3710819","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"1250-1264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9815-0128","authenticated-orcid":false,"given":"Suryeon","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0908-1233","authenticated-orcid":false,"given":"Seung Ho","family":"Na","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8048-097X","authenticated-orcid":false,"given":"Jaehan","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1077-5606","authenticated-orcid":false,"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9528-4002","authenticated-orcid":false,"given":"Hyunwoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Sungshin Women's University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2023. PageSpeed Insights. https:\/\/pagespeed.web.dev\/."},{"key":"e_1_3_3_2_3_2","unstructured":"2023. The Selenium Project. https:\/\/www.selenium.dev\/."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Sanjit Bhat David Lu Albert Kwon and Srinivas Devadas. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. Proceedings on Privacy Enhancing Technologies 4 (2019) 292\u2013310.","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_3_2_6_2","first-page":"753","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online website fingerprinting: Evaluating website fingerprinting attacks on Tor in the real world. In 31st USENIX Security Symposium (USENIX Security 22). 753\u2013770."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247741"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527416"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485902"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00013"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567979"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Pawel Gepner Victor Gamayunov and David\u00a0L Fraser. 2011. Early performance evaluation of AVX for HPC. Procedia Computer Science 4 (2011) 452\u2013460.","DOI":"10.1016\/j.procs.2011.04.047"},{"key":"e_1_3_3_2_16_2","first-page":"717","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. 2020. Zero-delay Lightweight Defenses against Website Fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20). 717\u2013734."},{"key":"e_1_3_3_2_17_2","first-page":"955","volume-title":"27th { USENIX} Security Symposium ({ USENIX} Security 18)","author":"Gras Ben","year":"2018","unstructured":"Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In 27th { USENIX} Security Symposium ({ USENIX} Security 18). 955\u2013972."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_3_2_19_2","first-page":"897","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache template attacks: Automating attacks on inclusive { Last-Level} caches. In 24th USENIX Security Symposium (USENIX Security 15). 897\u2013912."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Berk Gulmezoglu. 2021. XAI-based microarchitectural side-channel analysis for website fingerprinting attacks and defenses. IEEE transactions on dependable and secure computing 19 6 (2021) 4039\u20134051.","DOI":"10.1109\/TDSC.2021.3117145"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_5"},{"key":"e_1_3_3_2_22_2","first-page":"1187","volume-title":"USENIX security symposium","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes, George Danezis, et\u00a0al. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX security symposium. 1187\u20131203."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"James\u00a0K Holland and Nicholas Hopper. 2022. RegulaTor: A Straightforward Website Fingerprinting Defense. Proc. Priv. Enhancing Technol. 2022 2 (2022) 344\u2013362.","DOI":"10.2478\/popets-2022-0049"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Xing Hu Ling Liang Shuangchen Li Lei Deng Pengfei Zuo Yu Ji Xinfeng Xie Yufei Ding Chang Liu Timothy Sherwood et\u00a0al. 2020. Deepsniffer: A dnn model extraction framework based on learning architectural hints. 385\u2013399\u00a0pages.","DOI":"10.1145\/3373376.3378460"},{"key":"e_1_3_3_2_25_2","unstructured":"Intel. 2021. Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual. Intel Corporation (2021)."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_3_2_28_2","unstructured":"Hwancheol Jeong Sunghoon Kim Weonjong Lee and Seok-Ho Myung. 2012. Performance of SSE and AVX instruction sets. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1211.0820 (2012)."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991080"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Suryeon Kim Seungwon Shin and Hyunwoo Choi. 2023. AVX-TSCHA: Leaking Information Through AVX Extensions in Commercial Processors. Computers & Security (2023) 103437.","DOI":"10.1016\/j.cose.2023.103437"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00027"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Ding Li Yuefei Zhu Minghao Chen and Jue Wang. 2022. Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches. IEEE Transactions on Information Forensics and Security 17 (2022) 2437\u20132451.","DOI":"10.1109\/TIFS.2022.3186743"},{"key":"e_1_3_3_2_35_2","first-page":"1579","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li Jianfeng","year":"2022","unstructured":"Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, and Xiaobo Ma. 2022. { FOAP} :{ Fine-Grained}{ Open-World} Android App Fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 1579\u20131596."},{"key":"e_1_3_3_2_36_2","first-page":"643","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Lipp Moritz","year":"2022","unstructured":"Moritz Lipp, Daniel Gruss, and Michael Schwarz. 2022. { AMD} prefetch attacks through power and time. In 31st USENIX Security Symposium (USENIX Security 22). 643\u2013660."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384746"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358650"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00026"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564657"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"e_1_3_3_2_43_2","first-page":"2705","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Nasr Milad","year":"2021","unstructured":"Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2021. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In 30th USENIX Security Symposium (USENIX Security 21). 2705\u20132722."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665950"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Daryna Oliynyk Rudolf Mayer and Andreas Rauber. 2023. I know what you trained last summer: A survey on stealing machine learning models and defences. Comput. Surveys 55 14s (2023) 1\u201341.","DOI":"10.1145\/3595292"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712588"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Mohammad\u00a0Saidur Rahman Payap Sirinam Nate Mathews Kantha\u00a0Girish Gangadhara and Matthew Wright. 2020. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. Proc. Priv. Enhancing Technol. 2020 3 (2020) 5\u201324.","DOI":"10.2478\/popets-2020-0043"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Vera Rimmer Davy Preuveneers Marc Juarez Tom Van\u00a0Goethem and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1708.06376 (2017).","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_3_2_53_2","unstructured":"Michael Schwarz Claudio Canella Lukas Giner and Daniel Gruss. 2019. Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs (Updated and Extended Version). arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1905.05725 (2019)."},{"key":"e_1_3_3_2_54_2","volume-title":"CCS","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van\u00a0Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. In CCS."},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33488-7_2"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486875"},{"key":"e_1_3_3_2_57_2","first-page":"2863","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Shusterman Anatoly","year":"2021","unstructured":"Anatoly Shusterman, Ayush Agarwal, Sioli O\u2019Connell, Daniel Genkin, Yossi Oren, and Yuval Yarom. 2021. { Prime+ Probe} 1,{ JavaScript} 0: Overcoming Browser-based { Side-Channel} Defenses. In 30th USENIX Security Symposium (USENIX Security 21). 2863\u20132880."},{"key":"e_1_3_3_2_58_2","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Shusterman Anatoly","year":"2019","unstructured":"Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"},{"key":"e_1_3_3_2_61_2","unstructured":"Nitish Srivastava Geoffrey Hinton Alex Krizhevsky Ilya Sutskever and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15 1 (2014) 1929\u20131958."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77242-4"},{"key":"e_1_3_3_2_63_2","first-page":"989","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Tatar Andrei","year":"2022","unstructured":"Andrei Tatar, Dani\u00ebl Trujillo, Cristiano Giuffrida, and Herbert Bos. 2022. { TLB; DR} : Enhancing { TLB-based} Attacks with { TLB} Desynchronized Reverse Engineering. In 31st USENIX Security Symposium (USENIX Security 22). 989\u20131007."},{"key":"e_1_3_3_2_64_2","first-page":"849","volume-title":"USENIX Security Symposium","author":"Vila Pepe","year":"2017","unstructured":"Pepe Vila and Boris K\u00f6pf. 2017. Loophole: Timing Attacks on Shared Event Loops in Chrome.. In USENIX Security Symposium. 849\u2013864."},{"key":"e_1_3_3_2_65_2","first-page":"143","volume-title":"23rd { USENIX} Security Symposium ({ USENIX} Security 14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd { USENIX} Security Symposium ({ USENIX} Security 14). 143\u2013157."},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_3_2_67_2","first-page":"1375","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. { Walkie-Talkie} : An efficient defense against passive website fingerprinting attacks. In 26th USENIX Security Symposium (USENIX Security 17). 1375\u20131390."},{"key":"e_1_3_3_2_68_2","first-page":"7267","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhang Ruiyi","year":"2023","unstructured":"Ruiyi Zhang, Taehyun Kim, Daniel Weber, and Michael Schwarz. 2023. ({ M) WAIT} for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. In 32nd USENIX Security Symposium (USENIX Security 23). 7267\u20137284."},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00039"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437517"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3710819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:26:03Z","timestamp":1755069963000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3710819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":69,"alternative-id":["10.1145\/3708821.3710819","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3710819","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}