{"id":"https://openalex.org/W2807551428","doi":"https://doi.org/10.1145/3196494.3196501","title":"Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses","display_name":"Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2807551428","doi":"https://doi.org/10.1145/3196494.3196501","mag":"2807551428"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196501","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196501","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196501","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196501","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050327951","display_name":"Sanchuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanchuan Chen","raw_affiliation_strings":["Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101742628","display_name":"Fangfei Liu","orcid":"https://orcid.org/0009-0001-8355-7028"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fangfei Liu","raw_affiliation_strings":["Intel Corporation, Hillsboro, OR, USA"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051857167","display_name":"Zeyu Mi","orcid":"https://orcid.org/0000-0001-8395-1319"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeyu Mi","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035657440","display_name":"Ruby B. Lee","orcid":"https://orcid.org/0000-0001-9497-0777"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruby B. Lee","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406215","display_name":"Haibo Chen","orcid":"https://orcid.org/0000-0002-9720-0361"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Chen","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333239","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0002-3583-369X"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoFeng Wang","raw_affiliation_strings":["Indiana University at Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University at Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5050327951"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":2.7078,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.92288576,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"601","last_page":"608"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8769869804382324},{"id":"https://openalex.org/keywords/transactional-memory","display_name":"Transactional memory","score":0.8233754634857178},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7480080127716064},{"id":"https://openalex.org/keywords/cache-coherence","display_name":"Cache coherence","score":0.5883397459983826},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5804458856582642},{"id":"https://openalex.org/keywords/cache-coloring","display_name":"Cache coloring","score":0.5673723220825195},{"id":"https://openalex.org/keywords/cache-pollution","display_name":"Cache pollution","score":0.5597096085548401},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.5592982769012451},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.5336732268333435},{"id":"https://openalex.org/keywords/bus-sniffing","display_name":"Bus sniffing","score":0.5048783421516418},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4848412275314331},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.464832067489624},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.4553738534450531},{"id":"https://openalex.org/keywords/software-transactional-memory","display_name":"Software transactional memory","score":0.45529818534851074},{"id":"https://openalex.org/keywords/mesi-protocol","display_name":"MESI protocol","score":0.4476989209651947},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.33452892303466797},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2659761905670166},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1752583384513855},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12359321117401123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8769869804382324},{"id":"https://openalex.org/C134277064","wikidata":"https://www.wikidata.org/wiki/Q878206","display_name":"Transactional memory","level":3,"score":0.8233754634857178},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7480080127716064},{"id":"https://openalex.org/C141917322","wikidata":"https://www.wikidata.org/wiki/Q1025017","display_name":"Cache coherence","level":5,"score":0.5883397459983826},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5804458856582642},{"id":"https://openalex.org/C201148951","wikidata":"https://www.wikidata.org/wiki/Q5015976","display_name":"Cache coloring","level":4,"score":0.5673723220825195},{"id":"https://openalex.org/C113166858","wikidata":"https://www.wikidata.org/wiki/Q5015981","display_name":"Cache pollution","level":5,"score":0.5597096085548401},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.5592982769012451},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.5336732268333435},{"id":"https://openalex.org/C51185590","wikidata":"https://www.wikidata.org/wiki/Q1017228","display_name":"Bus sniffing","level":5,"score":0.5048783421516418},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4848412275314331},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.464832067489624},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.4553738534450531},{"id":"https://openalex.org/C167149655","wikidata":"https://www.wikidata.org/wiki/Q1189004","display_name":"Software transactional memory","level":4,"score":0.45529818534851074},{"id":"https://openalex.org/C120936851","wikidata":"https://www.wikidata.org/wiki/Q1408065","display_name":"MESI protocol","level":5,"score":0.4476989209651947},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.33452892303466797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2659761905670166},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1752583384513855},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12359321117401123}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196501","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196501","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196501","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196501","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196501","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196501","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2190930083","display_name":null,"funder_award_id":"W911NF1610127","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G3722124482","display_name":null,"funder_award_id":"1566444,1750809","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G59642618","display_name":null,"funder_award_id":"1566444","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6982404986","display_name":"TWC: Small: Understanding and Mitigating the Security Hazards of Mobile Fragmentation","funder_award_id":"1527141","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7173930897","display_name":null,"funder_award_id":"1526493","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7726243484","display_name":null,"funder_award_id":"CNS-1527141","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2807551428.pdf","grobid_xml":"https://content.openalex.org/works/W2807551428.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1503814339","https://openalex.org/W1531820677","https://openalex.org/W1584476834","https://openalex.org/W1934458198","https://openalex.org/W1992291252","https://openalex.org/W2034195502","https://openalex.org/W2066660519","https://openalex.org/W2073524356","https://openalex.org/W2076837008","https://openalex.org/W2103289002","https://openalex.org/W2106728965","https://openalex.org/W2131202839","https://openalex.org/W2147150814","https://openalex.org/W2161958410","https://openalex.org/W2169461225","https://openalex.org/W2172060328","https://openalex.org/W2255548496","https://openalex.org/W2302098303","https://openalex.org/W2399169582","https://openalex.org/W2744175342","https://openalex.org/W2949317607","https://openalex.org/W2950775255"],"related_works":["https://openalex.org/W2290195868","https://openalex.org/W4285204597","https://openalex.org/W2584505417","https://openalex.org/W4250245788","https://openalex.org/W3193874149","https://openalex.org/W2106198180","https://openalex.org/W2013212244","https://openalex.org/W1555453305","https://openalex.org/W1955250293","https://openalex.org/W2047210963"],"abstract_inverted_index":{"A":[0],"program's":[1,42],"use":[2],"of":[3,51,108,133],"CPU":[4],"caches":[5],"may":[6],"reveal":[7],"its":[8],"memory":[9,22,77],"access":[10],"pattern":[11],"and":[12,61,158],"thus":[13],"leak":[14],"sensitive":[15],"information":[16],"when":[17,94],"the":[18,40,55,95,106,113,134,179,184],"program":[19],"performs":[20],"secret-dependent":[21],"accesses.":[23],"In":[24,66],"recent":[25],"studies,":[26],"it":[27],"has":[28],"been":[29],"demonstrated":[30],"that":[31,35,73,93,116,137,151,178],"cache":[32,43,88,101,114,120,145],"side-channel":[33,89,121],"attacks":[34,60,122],"extract":[36],"secrets":[37],"by":[38,99,171,183],"observing":[39],"victim":[41],"uses":[44],"can":[45],"be":[46],"conducted":[47],"under":[48],"a":[49,71,130,138,148],"variety":[50],"scenarios,":[52],"among":[53],"which":[54],"most":[56],"concerning":[57],"are":[58],"cross-VM":[59],"those":[62],"against":[63,86],"SGX":[64],"enclaves.":[65],"this":[67],"paper,":[68],"we":[69],"propose":[70,147],"mechanism":[72],"leverages":[74,152],"hardware":[75,126],"transactional":[76],"(HTM)":[78],"to":[79,83,143,154,166],"enable":[80],"software":[81,149],"programs":[82],"defend":[84],"themselves":[85],"various":[87],"attacks.":[90],"We":[91,128],"observe":[92],"HTM":[96,153],"is":[97,105,117,187],"implemented":[98],"retrofitting":[100],"coherence":[102],"protocols,":[103],"as":[104],"case":[107],"Intel's":[109],"Transactional":[110],"Synchronization":[111],"Extensions,":[112],"interference":[115],"necessary":[118],"in":[119,163],"will":[123],"inevitably":[124],"terminate":[125],"transactions.":[127],"provide":[129],"systematic":[131],"analysis":[132],"security":[135],"requirements":[136,157],"software-only":[139],"solution":[140,186],"must":[141],"meet":[142],"defeat":[144],"attacks,":[146],"design":[150],"satisfy":[155],"these":[156],"devise":[159],"several":[160],"optimization":[161],"techniques":[162],"our":[164],"implementation":[165],"reduce":[167],"performance":[168,180],"impact":[169],"caused":[170,182],"transaction":[172],"aborts.":[173],"The":[174],"empirical":[175],"evaluation":[176],"suggests":[177],"overhead":[181],"HTM-based":[185],"low.":[188]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
