{"id":"https://openalex.org/W3092271037","doi":"https://doi.org/10.1109/dac18072.2020.9218725","title":"Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage","display_name":"Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3092271037","doi":"https://doi.org/10.1109/dac18072.2020.9218725","mag":"3092271037"},"language":"en","primary_location":{"id":"doi:10.1109/dac18072.2020.9218725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18072.2020.9218725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 57th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012909235","display_name":"Hongyu Fang","orcid":"https://orcid.org/0000-0002-5951-1556"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongyu Fang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Washington University, Washington, DC"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Washington University, Washington, DC","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042973603","display_name":"Milo\u0161 Doroslova\u010dki","orcid":"https://orcid.org/0000-0003-4101-3249"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Doroslovacki","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Washington University, Washington, DC"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Washington University, Washington, DC","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045879054","display_name":"Guru Venkataramani","orcid":"https://orcid.org/0000-0002-7084-7560"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guru Venkataramani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Washington University, Washington, DC"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Washington University, Washington, DC","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012909235"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.686,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77082634,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.8412948846817017},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7871556878089905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.786043107509613},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7489681839942932},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5324666500091553},{"id":"https://openalex.org/keywords/trap","display_name":"Trap (plumbing)","score":0.4789986312389374},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4450913965702057},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.44325560331344604},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.41269451379776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38730984926223755},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.365420401096344},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3201013207435608},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17309892177581787},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09600436687469482}],"concepts":[{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.8412948846817017},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7871556878089905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.786043107509613},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7489681839942932},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5324666500091553},{"id":"https://openalex.org/C121099081","wikidata":"https://www.wikidata.org/wiki/Q665580","display_name":"Trap (plumbing)","level":2,"score":0.4789986312389374},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4450913965702057},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.44325560331344604},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.41269451379776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38730984926223755},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.365420401096344},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3201013207435608},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17309892177581787},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09600436687469482},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac18072.2020.9218725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18072.2020.9218725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 57th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1555558540","https://openalex.org/W1797940646","https://openalex.org/W1934458198","https://openalex.org/W2103289002","https://openalex.org/W2147657366","https://openalex.org/W2166844173","https://openalex.org/W2182467309","https://openalex.org/W2255548496","https://openalex.org/W2561988158","https://openalex.org/W2625555681","https://openalex.org/W2752929869","https://openalex.org/W2808687865","https://openalex.org/W2883613460","https://openalex.org/W2905380323","https://openalex.org/W2928156253","https://openalex.org/W2949090999","https://openalex.org/W2963311060","https://openalex.org/W3007346474","https://openalex.org/W3029114445","https://openalex.org/W4248763076","https://openalex.org/W6628261430","https://openalex.org/W6633448724","https://openalex.org/W6638692948"],"related_works":["https://openalex.org/W1557094818","https://openalex.org/W2199813689","https://openalex.org/W4388150944","https://openalex.org/W4252447916","https://openalex.org/W4323824501","https://openalex.org/W2369033613","https://openalex.org/W2183246718","https://openalex.org/W2511880725","https://openalex.org/W2099261052","https://openalex.org/W4212981280"],"abstract_inverted_index":{"Modern":[0],"computing":[1],"systems":[2],"typically":[3,15],"have":[4,14,20,37],"multiple":[5],"users":[6],"sharing":[7],"hardware":[8,13],"resources.":[9],"While":[10],"such":[11,26],"shared":[12],"been":[16,38],"performance":[17,54],"boosters,":[18],"they":[19],"also":[21],"led":[22],"to":[23,59,80,91],"inadvertent":[24],"side-effects":[25],"as":[27],"side":[28,43,76],"channels.":[29,69],"Caches,":[30],"that":[31,104],"present":[32],"the":[33,61,93,97],"largest":[34],"attack":[35],"surface,":[36],"popular":[39],"among":[40],"adversaries":[41,108],"for":[42],"channel":[44,77],"attacks.":[45],"In":[46],"this":[47],"work,":[48],"we":[49,105],"repurpose":[50],"a":[51],"classic":[52],"cache":[53,67,75],"metric":[55],"namely,":[56],"reuse":[57,82],"distance,":[58],"capture":[60],"activity":[62],"of":[63],"an":[64,73],"adversary":[65],"in":[66],"timing":[68,115],"We":[70],"design":[71],"Reuse-trap,":[72],"efficient":[74],"mitigation":[78],"framework":[79],"record":[81],"distances":[83],"during":[84],"victim":[85],"accesses":[86],"and":[87,113],"carefully":[88],"inject":[89],"noise":[90],"mislead":[92],"spy":[94],"from":[95,118],"inferring":[96],"victim\u2019s":[98],"activity.":[99],"Our":[100],"experimental":[101],"results":[102],"show":[103],"can":[106],"identify":[107],"with":[109],"zero":[110],"false":[111],"positives":[112],"make":[114],"channels":[116],"suffer":[117],"over":[119],"50%":[120],"bit":[121],"error":[122],"rate":[123],"on":[124],"average.":[125]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
