{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:38Z","timestamp":1755225218656,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101076409"],"award-info":[{"award-number":["101076409"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["539710462,502228341,465958100"],"award-info":[{"award-number":["539710462,502228341,465958100"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BMBF","award":["16KIS2262"],"award-info":[{"award-number":["16KIS2262"]}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["10.55776\/I6054"],"award-info":[{"award-number":["10.55776\/I6054"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Red Hat"},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736197","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"1676-1689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Systematic Analysis of Kernel Security Performance and Energy Costs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7286-1156","authenticated-orcid":false,"given":"Fabian","family":"Rauscher","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8725-3454","authenticated-orcid":false,"given":"Benedict","family":"Herzog","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1818-0869","authenticated-orcid":false,"given":"Timo","family":"H\u00f6nig","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Akinlolu Adekotujo Adedoyin Odumabo Ademola Adedokun and Olukayode Aiyeniko. 2020. A Comparative Study of Operating Systems: Case of Windows UNIX Linux Mac Android and iOS. International Journal of Computer Applications 176 39 (2020) 16\u201323.","DOI":"10.5120\/ijca2020920494"},{"key":"e_1_3_3_2_3_2","volume-title":"AMD uProf User Guide (3.2 ed.)","year":"2019","unstructured":"Advanced Micro Devices Inc. 2019. AMD uProf User Guide (3.2 ed.). Advanced Micro Devices Inc."},{"key":"e_1_3_3_2_4_2","volume-title":"USENIX ATC","author":"Amit Nadav","year":"2019","unstructured":"Nadav Amit, Fred Jacobs, and Michael Wei. 2019. Jumpswitches: restoring the performance of indirect branches in the era of spectre. In USENIX ATC."},{"key":"e_1_3_3_2_5_2","first-page":"1073","volume-title":"USENIX Security","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In USENIX Security. 1073\u20131090."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379139"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_3_2_8_2","volume-title":"USENIX Security","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo Van\u00a0Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. In USENIX Security."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Eugenio Capra Chiara Francalanci and Sandra\u00a0A Slaughter. 2012. Measuring application software energy efficiency. IT Professional 14 2 (2012) 54\u201361.","DOI":"10.1109\/MITP.2012.39"},{"key":"e_1_3_3_2_10_2","unstructured":"Alexis Challande. 2022. Towards 1-day Vulnerability Detection using Semantic Patch Signatures."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901763"},{"key":"e_1_3_3_2_12_2","unstructured":"Jonathan Corbet. 2014. BPF: the universal in-kernel virtual machine. https:\/\/lwn.net\/Articles\/599755\/"},{"key":"e_1_3_3_2_13_2","unstructured":"Jonathan Corbet. 2019. Many uses for Core scheduling. https:\/\/lwn.net\/Articles\/799454\/"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446740"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Christian Eichler Jonas R\u00f6ckl Benedikt Jung Ralph Schlenk Tilo M\u00fcller and Timo H\u00f6nig. 2024. Profiling with trust: system monitoring from trusted execution environments. Design Automation for Embedded Systems (2024). 10.1007\/s10617-024-09283-1","DOI":"10.1007\/s10617-024-09283-1"},{"key":"e_1_3_3_2_16_2","unstructured":"Matteo Fusi. 2017. Information-Leakage Analysis Based on Hardware Performance Counters."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.49"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442442.3452057"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Corey Gough Ian Steiner Winston Saunders Corey Gough Ian Steiner and Winston Saunders. 2015. CPU Power Management. Energy Efficient Servers: Blueprints for Data Center Optimization (2015).","DOI":"10.1007\/978-1-4302-6638-9"},{"key":"e_1_3_3_2_20_2","unstructured":"Daniel Gruss Dave Hansen and Brendan Gregg. 2018. Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer. USENIX ;login (2018)."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2015.70"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Marcus H\u00e4hnel Bj\u00f6rn D\u00f6bel Marcus V\u00f6lp and Hermann H\u00e4rtig. 2012. Measuring Energy Consumption for Short Code Paths Using RAPL. ACM SIGMETRICS Performance Evaluation Review 40 (2012) 13\u201317.","DOI":"10.1145\/2425248.2425252"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Ashif\u00a0S Harji Peter\u00a0A Buhr and Tim Brecht. 2013. Our troubles with Linux kernel upgrades and why you should care. ACM SIGOPS Operating Systems Review 47 2 (2013) 66\u201372.","DOI":"10.1145\/2506164.2506175"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458721"},{"key":"e_1_3_3_2_26_2","unstructured":"Joel Hruska. 2019. Intel Performance Hit 5x Harder Than AMD After Spectre Meltdown Patches. https:\/\/www.extremetech.com\/computing\/291649-intel-performance-amd-spectre-meltdown-mds-patches"},{"key":"e_1_3_3_2_27_2","volume-title":"USENIX ATC","author":"Hua Zhichao","year":"2018","unstructured":"Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang. 2018. EPTI: efficient defence against meltdown attack for unpatched VMs. In USENIX ATC."},{"key":"e_1_3_3_2_28_2","unstructured":"Intel. 2018. Speculative Execution Side Channel Mitigations. Revision 3.0."},{"key":"e_1_3_3_2_29_2","unstructured":"Intel. 2019. Intel\u00ae Transactional Synchronization Extensions (Intel\u00ae TSX) Asynchronous Abort \/ CVE-2019-11135 \/ INTEL-SA-00270. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/intel-tsx-asynchronous-abort.html"},{"key":"e_1_3_3_2_30_2","unstructured":"Intel. 2022. Running Average Power Limit Energy Reporting. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/running-average-power-limit-energy-reporting.html"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640373"},{"key":"e_1_3_3_2_32_2","unstructured":"The\u00a0Linux Kernel. 2023. The kernel\u2019s command-line parameters. https:\/\/www.kernel.org\/doc\/html\/v6.2\/admin-guide\/kernel-parameters.html"},{"key":"e_1_3_3_2_33_2","unstructured":"The\u00a0Linux Kernel. 2024. Linux CVE-Announce Mailing List. https:\/\/lore.kernel.org\/linux-cve-announce\/"},{"key":"e_1_3_3_2_34_2","unstructured":"kernel.org. 2023. The kernel\u2019s command-line parameters. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/kernel-parameters.html"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Kashif\u00a0Nizam Khan Mikael Hirki Tapio Niemi Jukka\u00a0K. Nurminen and Zhonghong Ou. 2018. RAPL in Action: Experiences in Using RAPL for Power Measurements. ToMPECS 3 (2018) 1\u201326.","DOI":"10.1145\/3177754"},{"key":"e_1_3_3_2_36_2","volume-title":"ISCA","author":"Kim Yoongu","year":"2014","unstructured":"Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji\u00a0Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors. In ISCA."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Gerwin Klein June Andronick Kevin Elphinstone Toby Murray Thomas Sewell Rafal Kolanski and Gernot Heiser. 2014. Comprehensive Formal Verification of an OS Microkernel. ACM Transactions on Computer Systems 32 1 (2014) 2:1\u20132:70. 10.1145\/2560537","DOI":"10.1145\/2560537"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_3_2_40_2","volume-title":"USENIX Security","author":"Kogler Andreas","year":"2023","unstructured":"Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, and Stefan Mangard. 2023. Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. In USENIX Security."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00048"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507759"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"e_1_3_3_2_45_2","volume-title":"USENIX Security","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In USENIX Security."},{"key":"e_1_3_3_2_46_2","volume-title":"CCS","author":"Liu Chen","year":"2022","unstructured":"Chen Liu, Abhishek Chakraborty, Nikhil Chawla, and Neer Roggel. 2022. Frequency throttling side-channel attack. In CCS."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3342491"},{"key":"e_1_3_3_2_48_2","unstructured":"Nicholas Luedtke. 2023. Linux Kernel CVEs. https:\/\/www.linuxkernelcves.com"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582054"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_11"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Naveen Muralimanohar Rajeev Balasubramonian and Norman\u00a0P Jouppi. 2009. CACTI 6.0: A tool to model large caches. HP laboratories 27 (2009) 28.","DOI":"10.1109\/MM.2008.2"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.126-153"},{"key":"e_1_3_3_2_54_2","unstructured":"Jacob Pan. 2013. RAPL (Running Average Power Limit) driver. https:\/\/lwn.net\/Articles\/545745\/"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3136014.3136031"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548281"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00145"},{"key":"e_1_3_3_2_58_2","volume-title":"USENIX Security","author":"Reis Charles","year":"2019","unstructured":"Charles Reis, Alexander Moshchuk, and Nasko Oskov. 2019. Site Isolation: Process Separation for Web Sites within the Browser. In USENIX Security."},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359640"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Alireza Shameli-Sendi. 2021. Understanding Linux kernel vulnerabilities. Journal of Computer Virology and Hacking Techniques 17 4 (2021) 265\u2013278.","DOI":"10.1007\/s11416-021-00379-x"},{"key":"e_1_3_3_2_61_2","volume-title":"China-Europe International Symposium on Software Engineering Education","author":"Siavvas Miltiadis","year":"2019","unstructured":"Miltiadis Siavvas, Charalampos Marantos, Lazaros Papadopoulos, Dionysios Kehagias, Dimitrios Soudris, and Dimitrios Tzovaras. 2019. On the relationship between software security and energy consumption. In China-Europe International Symposium on Software Engineering Education."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380920"},{"key":"e_1_3_3_2_63_2","unstructured":"The Linux Kernel. 2024. Dealing with bugs: CVEs. https:\/\/docs.kernel.org\/process\/cve.html"},{"key":"e_1_3_3_2_64_2","volume-title":"USENIX Security","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang, Riccardo Paccagnella, Elizabeth He, Hovav Shacham, Christopher\u00a0W. Fletcher, and David Kohlbrenner. 2022. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In USENIX Security."},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875934"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:26:38Z","timestamp":1755069998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":64,"alternative-id":["10.1145\/3708821.3736197","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736197","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}