{"id":"https://openalex.org/W4399396286","doi":"https://doi.org/10.1109/host55342.2024.10545415","title":"Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks","display_name":"Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399396286","doi":"https://doi.org/10.1109/host55342.2024.10545415"},"language":"en","primary_location":{"id":"doi:10.1109/host55342.2024.10545415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110534354","display_name":"Upasana Mandal","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Upasana Mandal","raw_affiliation_strings":["IIT Kharagpur,CSE Department,Kharagpur,India","CSE Department, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur,CSE Department,Kharagpur,India","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"CSE Department, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101816833","display_name":"Sarani Bhattacharya","orcid":"https://orcid.org/0000-0002-4190-2671"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarani Bhattacharya","raw_affiliation_strings":["IIT Kharagpur,CSE Department,Kharagpur,India","CSE Department, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur,CSE Department,Kharagpur,India","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"CSE Department, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["IIT Kharagpur,CSE Department,Kharagpur,India","CSE Department, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur,CSE Department,Kharagpur,India","institution_ids":["https://openalex.org/I145894827"]},{"raw_affiliation_string":"CSE Department, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110534354"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":0.3862,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63791716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"86","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8588992357254028},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.720501184463501},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4792202115058899},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4390888810157776},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39877748489379883},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.38317620754241943},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.32601720094680786},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25950223207473755},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1830507516860962}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8588992357254028},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.720501184463501},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4792202115058899},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4390888810157776},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39877748489379883},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.38317620754241943},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.32601720094680786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25950223207473755},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1830507516860962}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host55342.2024.10545415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1934458198","https://openalex.org/W2097778649","https://openalex.org/W2119028650","https://openalex.org/W2912675049","https://openalex.org/W6940342628"],"related_works":["https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2769734684","https://openalex.org/W2969678054","https://openalex.org/W2903787673","https://openalex.org/W2777343049","https://openalex.org/W3158338108","https://openalex.org/W2584285084","https://openalex.org/W1796231437"],"abstract_inverted_index":{"UMONITOR":[0],"and":[1,18,51,79,117,151],"UMWAIT":[2],"are":[3],"special":[4],"instructions":[5,45,140],"that":[6,137],"have":[7,64,96,122,167],"been":[8],"introduced":[9,65],"in":[10,25],"the":[11,83,98,101,105,113,128,174],"newer":[12],"age":[13],"Intel":[14,175],"micro-architecture,":[15],"specifically":[16],"Tremont":[17],"subsequent":[19],"generations,":[20],"to":[21,93,144,152],"optimize":[22],"idle":[23],"loops":[24],"processors.":[26],"In":[27,91],"this":[28],"paper,":[29],"we":[30,95,121],"introduce":[31],"a":[32,54,66],"new":[33,67],"class":[34,88],"of":[35,89,100,115,130],"micro-architectural":[36],"attacks":[37],"using":[38],"nothing":[39],"but":[40],"some":[41],"user-level":[42],"instructions.":[43],"These":[44],"can":[46,159],"monitor":[47],"target":[48],"cache":[49,61,163],"lines":[50],"send":[52],"back":[53],"signal":[55],"on":[56,59,173],"sensing":[57],"activity":[58],"those":[60],"lines.":[62],"We":[63,134,166],"attack":[68,132],"primitive":[69],"named":[70],"Umprime":[71],"+":[72,86],"Umprobe":[73],"attack,":[74],"which":[75],"is":[76],"much":[77],"simpler":[78],"more":[80],"efficient":[81],"than":[82],"classical":[84],"prime":[85],"probe":[87],"attacks.":[90],"addition":[92],"this,":[94],"demonstrated":[97],"adaptability":[99],"threat":[102],"model":[103],"with":[104,112,127,162],"following":[106],"case":[107],"scenarios:":[108],"a)":[109],"website":[110],"fingerprinting":[111,126],"help":[114,129],"umwait":[116],"umonitor":[118],"instructions;":[119],"b)":[120],"also":[123,135],"performed":[124],"process":[125],"our":[131,171],"primitive.":[133],"show":[136,153],"these":[138],"user-privileged":[139],"could":[141],"be":[142,160],"used":[143],"create":[145],"timer-less":[146],"covert":[147],"channels":[148],"between":[149],"cores":[150],"how":[154],"full-fledged":[155],"information":[156],"leakage":[157],"assessments":[158],"done":[161],"coherency":[164],"protocols.":[165],"carried":[168],"out":[169],"all":[170],"experiments":[172],"12th":[176],"Generation":[177],"Alder":[178],"Lake":[179],"processor.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
