{"id":"https://openalex.org/W4416429941","doi":"https://doi.org/10.1109/iccad66269.2025.11241011","title":"CacheGuardian: A Timing Side-Channel Resilient LLC Design","display_name":"CacheGuardian: A Timing Side-Channel Resilient LLC Design","publication_year":2025,"publication_date":"2025-10-26","ids":{"openalex":"https://openalex.org/W4416429941","doi":"https://doi.org/10.1109/iccad66269.2025.11241011"},"language":null,"primary_location":{"id":"doi:10.1109/iccad66269.2025.11241011","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11241011","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ziang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziang Zhou","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091686747","display_name":"Qi Zhu","orcid":"https://orcid.org/0000-0002-6748-7250"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Zhu","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120557597","display_name":"Hao Lan","orcid":"https://orcid.org/0009-0002-2292-7133"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Lan","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024568191","display_name":"Huifeng Zhu","orcid":"https://orcid.org/0000-0002-0099-1911"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huifeng Zhu","raw_affiliation_strings":["Washington University in St. Louis"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015889998","display_name":"Wei Yan","orcid":"https://orcid.org/0009-0000-5295-1674"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yan","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084086792","display_name":"Chenglu Jin","orcid":"https://orcid.org/0000-0001-6306-8019"},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832","https://openalex.org/I4405262988"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Chenglu Jin","raw_affiliation_strings":["Centrum Wiskunde &amp; Informatica,Amsterdam"],"affiliations":[{"raw_affiliation_string":"Centrum Wiskunde &amp; Informatica,Amsterdam","institution_ids":["https://openalex.org/I1341640284"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101472673","display_name":"Xuejun An","orcid":"https://orcid.org/0009-0005-0494-6332"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuejun An","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023098180","display_name":"Xiaochun Ye","orcid":"https://orcid.org/0000-0003-4598-1685"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Ye","raw_affiliation_strings":["CAS,SKLP, Institute of Computing Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"CAS,SKLP, Institute of Computing Technology,Beijing,China","institution_ids":["https://openalex.org/I4210090176"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18426731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5914000272750854},{"id":"https://openalex.org/keywords/spec#","display_name":"Spec#","score":0.5249000191688538},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.49900001287460327},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.42500001192092896},{"id":"https://openalex.org/keywords/static-timing-analysis","display_name":"Static timing analysis","score":0.41920000314712524},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.39309999346733093},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3659999966621399},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.3476000130176544}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7609999775886536},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5914000272750854},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.5249000191688538},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.49900001287460327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49070000648498535},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45730000734329224},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.42500001192092896},{"id":"https://openalex.org/C93682380","wikidata":"https://www.wikidata.org/wiki/Q2025226","display_name":"Static timing analysis","level":2,"score":0.41920000314712524},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.39309999346733093},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30959999561309814},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2596000134944916},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad66269.2025.11241011","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11241011","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1503814339","https://openalex.org/W1934458198","https://openalex.org/W2147657366","https://openalex.org/W2255548496","https://openalex.org/W2337480911","https://openalex.org/W2794945502","https://openalex.org/W2795015774","https://openalex.org/W2796645376","https://openalex.org/W2810584084","https://openalex.org/W2903910116","https://openalex.org/W2905380323","https://openalex.org/W2931030580","https://openalex.org/W2934166125","https://openalex.org/W2963311060","https://openalex.org/W2976763854","https://openalex.org/W3029114445","https://openalex.org/W3090550073","https://openalex.org/W3092271037","https://openalex.org/W3135146000","https://openalex.org/W4200623403","https://openalex.org/W4287585808","https://openalex.org/W4308083824","https://openalex.org/W4308083923","https://openalex.org/W4390659912","https://openalex.org/W4390932576","https://openalex.org/W4391604029","https://openalex.org/W4394998522","https://openalex.org/W4400120328"],"related_works":[],"abstract_inverted_index":{"In":[0,49],"cloud":[1],"computing":[2],"environments,":[3],"the":[4,111,169],"last-level":[5],"cache":[6,107],"(LLC)":[7],"shared":[8],"by":[9,159,174],"multiple":[10,91],"tenants":[11],"is":[12,145],"frequently":[13],"exploited":[14],"through":[15],"timing":[16,73,92,152],"side-channel":[17,74,93,153],"attacks,":[18,45,154],"enabling":[19],"unauthorized":[20],"data":[21],"leakage.":[22],"To":[23],"address":[24],"this":[25],"issue,":[26],"various":[27],"defense":[28],"mechanisms":[29],"have":[30],"been":[31],"proposed.":[32],"However,":[33],"existing":[34],"works":[35],"exhibit":[36],"deficiencies":[37],"in":[38,95,123],"terms":[39],"of":[40,44,89,115,151,171,177],"performance":[41,78,170],"overhead,":[42],"coverage":[43],"and":[46,68,132,137],"detection":[47],"accuracy.":[48],"response":[50],"to":[51,64,127,161],"these":[52],"challenges,":[53],"we":[54],"propose":[55],"CacheGuardian,":[56],"a":[57,124,148],"hardware-based":[58],"LLC":[59],"protection":[60,71],"design":[61,122,144],"which":[62],"aims":[63],"provide":[65],"stronger,":[66],"broader,":[67],"more":[69],"accurate":[70],"against":[72,147],"attacks":[75,94,136],"with":[76,179],"low":[77],"overhead.":[79,183],"It":[80],"includes:":[81],"(1)":[82],"A":[83,99],"behavior-based,":[84],"generic":[85],"attack":[86,156],"detector":[87],"capable":[88],"identifying":[90],"real":[96],"time;":[97],"(2)":[98],"cache-set-level":[100],"access":[101],"control":[102],"mechanism":[103],"that":[104,142],"strictly":[105],"restricts":[106],"usage":[108],"exclusively":[109],"for":[110],"identified":[112],"attackers":[113],"instead":[114],"influencing":[116],"all":[117],"security":[118,131],"domains.We":[119],"implement":[120],"our":[121,143],"gem5":[125],"simulator":[126],"evaluate":[128],"both":[129],"its":[130],"performance.":[133],"Our":[134],"proof-of-concept":[135],"SPEC":[138],"2017":[139],"benchmarks":[140],"show":[141],"effective":[146],"wide":[149],"range":[150],"reducing":[155],"success":[157],"rates":[158],"up":[160],"256\u00d7,":[162],"including":[163],"camouflaged":[164],"variants.":[165],"Moreover,":[166],"it":[167],"improves":[168],"benign":[172],"workloads":[173],"an":[175],"average":[176],"2.26%":[178],"only":[180],"2.4%":[181],"storage":[182]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-11-20T00:00:00"}
