{"id":"https://openalex.org/W4214598380","doi":"https://doi.org/10.1142/s0218126622501626","title":"Thwarting Cache Side Channel Attacks with Encryption Address-Based Set Balance Cache","display_name":"Thwarting Cache Side Channel Attacks with Encryption Address-Based Set Balance Cache","publication_year":2022,"publication_date":"2022-02-25","ids":{"openalex":"https://openalex.org/W4214598380","doi":"https://doi.org/10.1142/s0218126622501626"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126622501626","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622501626","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023104000","display_name":"Chong Wang","orcid":"https://orcid.org/0000-0002-5556-0342"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chong Wang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101708967","display_name":"Shuai Wei","orcid":"https://orcid.org/0000-0002-4902-6645"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wei","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109331371","display_name":"Ke Song","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Song","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115604720","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-7985-8541"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Information Engineering University, 7 JianXueJie, Zhengzhou, Henan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023104000"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01577593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"31","issue":"09","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9732999801635742,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8567183017730713},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7882845997810364},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.6010581254959106},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.5997740626335144},{"id":"https://openalex.org/keywords/cache-pollution","display_name":"Cache pollution","score":0.5506769418716431},{"id":"https://openalex.org/keywords/cache-coloring","display_name":"Cache coloring","score":0.5337152481079102},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5330608487129211},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49368318915367126},{"id":"https://openalex.org/keywords/page-cache","display_name":"Page cache","score":0.48904499411582947},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4747341573238373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4484364092350006},{"id":"https://openalex.org/keywords/bus-sniffing","display_name":"Bus sniffing","score":0.4354532063007355},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3885362446308136},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.365070641040802},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3307350277900696},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2552209496498108}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8567183017730713},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7882845997810364},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.6010581254959106},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.5997740626335144},{"id":"https://openalex.org/C113166858","wikidata":"https://www.wikidata.org/wiki/Q5015981","display_name":"Cache pollution","level":5,"score":0.5506769418716431},{"id":"https://openalex.org/C201148951","wikidata":"https://www.wikidata.org/wiki/Q5015976","display_name":"Cache coloring","level":4,"score":0.5337152481079102},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5330608487129211},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49368318915367126},{"id":"https://openalex.org/C36340418","wikidata":"https://www.wikidata.org/wiki/Q7124288","display_name":"Page cache","level":5,"score":0.48904499411582947},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4747341573238373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4484364092350006},{"id":"https://openalex.org/C51185590","wikidata":"https://www.wikidata.org/wiki/Q1017228","display_name":"Bus sniffing","level":5,"score":0.4354532063007355},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3885362446308136},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.365070641040802},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3307350277900696},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2552209496498108}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126622501626","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622501626","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W75273247","https://openalex.org/W98341770","https://openalex.org/W1488058190","https://openalex.org/W1934458198","https://openalex.org/W2025539306","https://openalex.org/W2109683087","https://openalex.org/W2137453738","https://openalex.org/W2404948481","https://openalex.org/W2905380323","https://openalex.org/W2952265249","https://openalex.org/W2962832225","https://openalex.org/W2963311060","https://openalex.org/W3000130452","https://openalex.org/W3008872115","https://openalex.org/W3014505557","https://openalex.org/W3015942900","https://openalex.org/W3026626771","https://openalex.org/W3033396271","https://openalex.org/W3106626168","https://openalex.org/W3114268566","https://openalex.org/W3161749881","https://openalex.org/W3171256430","https://openalex.org/W3197412001","https://openalex.org/W4245923077"],"related_works":["https://openalex.org/W4312759433","https://openalex.org/W2148571123","https://openalex.org/W2161101294","https://openalex.org/W2026179701","https://openalex.org/W4380881125","https://openalex.org/W2302406141","https://openalex.org/W2365803410","https://openalex.org/W2184371594","https://openalex.org/W1970102182","https://openalex.org/W2113875634"],"abstract_inverted_index":{"The":[0,149,270],"deterministic":[1],"memory-to-cache":[2],"mapping":[3,151],"used":[4],"by":[5],"cache":[6,39,83,94,116,268],"side":[7,121],"channel":[8,122],"attack":[9,65],"causes":[10],"the":[11,27,46,63,80,133,140,144,154,168,201,212,235,266,282,295],"leakage":[12],"of":[13,34,82,214,237,265,273],"sensitive":[14],"information":[15],"such":[16,75],"as":[17],"secret":[18],"keys,":[19],"which":[20,162,186,196],"seriously":[21],"threatens":[22],"user":[23],"security":[24,204],"and":[25,96,131,189,258],"highlights":[26],"need":[28],"to":[29,44,57,118,158,199],"defend":[30],"against":[31],"this":[32,100,104],"kind":[33],"attack.":[35,123,170],"Recent":[36],"table-based":[37],"secure":[38],"design":[40,52,117],"requires":[41],"more":[42],"space":[43],"store":[45],"entry":[47],"while":[48],"a":[49,86,114,136,164,179],"purely":[50],"encryption-based":[51],"needs":[53],"complex":[54],"encryption":[55],"units":[56],"ensure":[58],"robustness.":[59,202],"What":[60,247],"is":[61,147,163,245,248,250,277],"more,":[62],"newer":[64],"algorithm":[66],"enabling":[67],"faster":[68],"eviction":[69,160],"set":[70,138,142,146],"discovery":[71],"may":[72],"still":[73],"break":[74],"defenses.":[76],"Even":[77],"though":[78,289],"increasing":[79],"association":[81],"can":[84,210,286],"be":[85],"potential":[87,242],"solution,":[88],"it":[89],"introduces":[90],"too":[91],"much":[92],"redundancy":[93],"access":[95],"storage":[97,271],"overhead.":[98],"In":[99],"paper,":[101],"we":[102,172,285],"eliminate":[103],"problem.":[105],"We":[106],"present":[107],"Encryption":[108],"address-based":[109],"Set":[110],"Balance":[111],"Cache":[112],"(ESBC),":[113],"novel":[115],"mitigate":[119],"cache-based":[120],"ESBC":[124,182,192],"encrypts":[125],"an":[126],"address":[127],"into":[128,139],"two-level":[129,150],"sets":[130,244],"displaces":[132],"data":[134],"from":[135,178],"primary":[137,145],"secondary":[141,243],"when":[143],"full.":[148],"structure":[152],"increases":[153],"complexity":[155],"for":[156,167,228],"attackers":[157],"build":[159],"sets,":[161],"vital":[165],"step":[166],"conflict-based":[169],"Furthermore,":[171],"adopt":[173],"two":[174,275,283],"different":[175],"optimized":[176],"variants":[177,276],"temporal":[180],"perspective,":[181,191],"with":[183,193,230],"remapping":[184],"(ESBCR),":[185],"serves":[187],"dynamic-remapping,":[188],"spatial":[190],"multi-mapping":[194,198],"(ESBCM),":[195],"performs":[197],"improve":[200],"Our":[203],"analysis":[205],"reveals":[206],"that":[207,239,251,288],"these":[208,274],"designs":[209],"confuse":[211],"exploitation":[213],"conflicting":[215],"addresses.":[216],"Simulation-based":[217],"evaluation":[218],"on":[219],"SPEC2017":[220],"shows":[221],"0.24%":[222],"instruction":[223],"per":[224,254],"cycle":[225],"(IPC)":[226],"degradation":[227],"ESBCR":[229,290],"1%":[231],"remap":[232],"rate.":[233],"While":[234],"reduction":[236],"ESBCM":[238,296],"has":[240,297],"five":[241],"0.69%.":[246],"exciting":[249],"both":[252],"miss":[253,259],"kilo":[255],"instructions":[256],"(MPKI)":[257],"rates":[260],"are":[261],"even":[262],"reduced":[263],"because":[264],"efficient":[267],"usage.":[269],"overhead":[272],"only":[278],"0.87%.":[279],"By":[280],"comparing":[281],"schemes,":[284],"observe":[287],"brings":[291],"less":[292],"performance":[293],"overhead,":[294],"better":[298],"scalability.":[299]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
