{"id":"https://openalex.org/W2949090999","doi":"https://doi.org/10.1109/hst.2019.8740835","title":"COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies","display_name":"COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2949090999","doi":"https://doi.org/10.1109/hst.2019.8740835","mag":"2949090999"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2019.8740835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2019.8740835","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033685295","display_name":"Fan Yao","orcid":"https://orcid.org/0000-0002-0360-5641"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fan Yao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012909235","display_name":"Hongyu Fang","orcid":"https://orcid.org/0000-0002-5951-1556"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongyu Fang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042973603","display_name":"Milo\u0161 Doroslova\u010dki","orcid":"https://orcid.org/0000-0003-4101-3249"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Doroslovacki","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045879054","display_name":"Guru Venkataramani","orcid":"https://orcid.org/0000-0002-7084-7560"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guru Venkataramani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033685295"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":1.6802,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.88194289,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"121","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8607587814331055},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.8198334574699402},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.629030704498291},{"id":"https://openalex.org/keywords/cache-pollution","display_name":"Cache pollution","score":0.5616311430931091},{"id":"https://openalex.org/keywords/smart-cache","display_name":"Smart Cache","score":0.5344582796096802},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.523002564907074},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.512050449848175},{"id":"https://openalex.org/keywords/cache-coloring","display_name":"Cache coloring","score":0.4426906108856201},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.43335115909576416},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42061352729797363},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3899196684360504},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.37149864435195923},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.3711419701576233},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3648056387901306},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17832398414611816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8607587814331055},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.8198334574699402},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.629030704498291},{"id":"https://openalex.org/C113166858","wikidata":"https://www.wikidata.org/wiki/Q5015981","display_name":"Cache pollution","level":5,"score":0.5616311430931091},{"id":"https://openalex.org/C167713795","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"Smart Cache","level":5,"score":0.5344582796096802},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.523002564907074},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.512050449848175},{"id":"https://openalex.org/C201148951","wikidata":"https://www.wikidata.org/wiki/Q5015976","display_name":"Cache coloring","level":4,"score":0.4426906108856201},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.43335115909576416},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42061352729797363},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3899196684360504},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.37149864435195923},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.3711419701576233},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3648056387901306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17832398414611816},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hst.2019.8740835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2019.8740835","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W1528653255","https://openalex.org/W1533145153","https://openalex.org/W1555558540","https://openalex.org/W1832887889","https://openalex.org/W1934458198","https://openalex.org/W1965071495","https://openalex.org/W1993489498","https://openalex.org/W2014182302","https://openalex.org/W2015772022","https://openalex.org/W2017371166","https://openalex.org/W2036853599","https://openalex.org/W2037322308","https://openalex.org/W2054161218","https://openalex.org/W2101823270","https://openalex.org/W2119028650","https://openalex.org/W2137453738","https://openalex.org/W2157116240","https://openalex.org/W2166293920","https://openalex.org/W2172060328","https://openalex.org/W2255548496","https://openalex.org/W2540054680","https://openalex.org/W2561988158","https://openalex.org/W2584029330","https://openalex.org/W2612454599","https://openalex.org/W2615272193","https://openalex.org/W2648282931","https://openalex.org/W2795015774","https://openalex.org/W2797889914","https://openalex.org/W2808687865","https://openalex.org/W2810584084","https://openalex.org/W2900966859","https://openalex.org/W2901937773","https://openalex.org/W4241773843","https://openalex.org/W4248763076","https://openalex.org/W6629297748","https://openalex.org/W6631841752","https://openalex.org/W6633448724","https://openalex.org/W6640560724"],"related_works":["https://openalex.org/W2133489088","https://openalex.org/W2363769136","https://openalex.org/W2114386333","https://openalex.org/W2734782074","https://openalex.org/W2126408955","https://openalex.org/W2098406302","https://openalex.org/W2148571123","https://openalex.org/W2031173804","https://openalex.org/W2115222420","https://openalex.org/W2369103246"],"abstract_inverted_index":{"Recent":[0],"studies":[1],"have":[2],"shown":[3],"how":[4],"adversaries":[5,25],"can":[6,120,204],"exploit":[7],"hardware":[8,63],"cache":[9,87,102,115,124,134,156,230,251,264],"structures":[10],"to":[11,113,137,218,260],"launch":[12],"information":[13],"leakage-based":[14],"attacks.":[15,144],"Among":[16],"these":[17],"attacks,":[18],"timing":[19,31,88,142,152,197,210],"channels":[20,153],"are":[21,148],"especially":[22],"worrisome":[23],"since":[24],"communicate":[26],"simply":[27],"by":[28,91,213,258],"modulating":[29],"the":[30,44,48,81,110,139],"of":[32,43,86,95,165,192,209],"shared":[33],"resource":[34,103],"accesses,":[35],"and":[36,105,175,189],"do":[37],"not":[38],"leave":[39],"any":[40],"physical":[41],"trace":[42],"communication.":[45],"Therefore,":[46],"guarding":[47],"system":[49,82],"against":[50,83],"such":[51],"attacks":[52,90,119,212],"is":[53],"critical.":[54],"Unfortunately,":[55],"most":[56],"existing":[57],"mitigation":[58],"mechanisms":[59],"either":[60],"require":[61],"non-trivial":[62],"modifications":[64],"and/or":[65],"incur":[66],"high":[67],"runtime":[68],"overheads.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73,226,253],"propose":[74],"COTSknight,":[75],"a":[76,163,228,237],"new":[77],"framework":[78,168],"that":[79,109,202,234],"guards":[80],"several":[84,207],"classes":[85,208],"channel":[89,143,211],"making":[92],"novel":[93],"use":[94],"Commercial":[96],"Off-The-Shelf":[97],"(COTS)":[98],"architectural":[99],"support":[100],"for":[101,141,245],"monitoring":[104],"prioritization.":[106],"We":[107,161],"find":[108],"adversary's":[111],"attempt":[112],"modulate":[114],"access":[116],"latency":[117],"during":[118],"be":[121],"captured":[122],"using":[123,154,180],"occupancy":[125,135],"patterns.":[126],"COTSknight":[127,150,167,203],"leverages":[128],"efficient":[129],"signal":[130],"processing":[131],"techniques":[132],"on":[133,169],"patterns":[136],"determine":[138],"potential":[140],"Once":[145],"suspicious":[146],"domains":[147],"identified,":[149],"disbands":[151],"dynamic":[155],"partitioning":[157],"schemes":[158],"in":[159,222,236],"hardware.":[160],"implement":[162],"prototype":[164],"our":[166],"an":[170,255],"Intel":[171],"Xeon":[172],"v4":[173],"server":[174],"evaluate":[176],"its":[177],"efficacy":[178],"extensively":[179],"different":[181],"spatial":[182],"encoding":[183],"schemes,":[184],"as":[185,187],"well":[186],"serial":[188],"parallel":[190],"implementations":[191],"Last":[193],"Level":[194],"Cache":[195],"(LLC)":[196],"channels.":[198],"Our":[199],"results":[200,235],"show":[201],"successfully":[205],"thwart":[206],"allocating":[214],"disjoint":[215],"LLC":[216],"ways":[217],"malicious":[219],"processes.":[220],"Even":[221],"benign":[223,247],"cache-intensive":[224],"workloads,":[225],"observe":[227,254],"6%":[229],"partition":[231],"trigger":[232],"rate":[233],"relatively":[238],"small":[239],"5%":[240],"worst-case":[241],"performance":[242,257],"degradation.":[243],"Interestingly,":[244],"some":[246],"applications,":[248],"upon":[249],"COTSknight's":[250],"partition,":[252],"improved":[256],"up":[259],"9.2%":[261],"through":[262],"eliminating":[263],"interference.":[265]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
