{"id":"https://openalex.org/W2902247216","doi":"https://doi.org/10.1145/3274694.3274715","title":"Analyzing Cache Side Channels Using Deep Neural Networks","display_name":"Analyzing Cache Side Channels Using Deep Neural Networks","publication_year":2018,"publication_date":"2018-12-03","ids":{"openalex":"https://openalex.org/W2902247216","doi":"https://doi.org/10.1145/3274694.3274715","mag":"2902247216"},"language":"en","primary_location":{"id":"doi:10.1145/3274694.3274715","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101591102","display_name":"Tianwei Zhang","orcid":"https://orcid.org/0000-0001-7335-7367"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tianwei Zhang","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["The Ohio State University"],"affiliations":[{"raw_affiliation_string":"The Ohio State University","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035657440","display_name":"Ruby B. Lee","orcid":"https://orcid.org/0000-0001-9497-0777"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruby B. Lee","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101591102"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7916,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.88899635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"174","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8672884702682495},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8222329616546631},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7974101901054382},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6602377891540527},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.59276282787323},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5346243977546692},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.48030751943588257},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.470119833946228},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4616031050682068},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4236992597579956},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41475486755371094},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4106371998786926},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38894686102867126},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32833486795425415},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32660192251205444},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27588510513305664}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8672884702682495},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8222329616546631},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7974101901054382},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6602377891540527},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.59276282787323},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5346243977546692},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.48030751943588257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.470119833946228},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4616031050682068},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4236992597579956},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41475486755371094},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4106371998786926},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38894686102867126},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32833486795425415},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32660192251205444},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27588510513305664},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3274694.3274715","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W147129824","https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1498436455","https://openalex.org/W1503814339","https://openalex.org/W1506713622","https://openalex.org/W1519063324","https://openalex.org/W1549794385","https://openalex.org/W1554359822","https://openalex.org/W1555558540","https://openalex.org/W1584476834","https://openalex.org/W1724890242","https://openalex.org/W1740185811","https://openalex.org/W1752847028","https://openalex.org/W1824405704","https://openalex.org/W1934458198","https://openalex.org/W1969819641","https://openalex.org/W1992291252","https://openalex.org/W1994616650","https://openalex.org/W1996007243","https://openalex.org/W2001759130","https://openalex.org/W2024540116","https://openalex.org/W2025539306","https://openalex.org/W2034195502","https://openalex.org/W2040870580","https://openalex.org/W2041103425","https://openalex.org/W2061354941","https://openalex.org/W2080672785","https://openalex.org/W2104182023","https://openalex.org/W2106728965","https://openalex.org/W2112968990","https://openalex.org/W2115200566","https://openalex.org/W2116469687","https://openalex.org/W2119966192","https://openalex.org/W2123145125","https://openalex.org/W2131202839","https://openalex.org/W2132350687","https://openalex.org/W2137453738","https://openalex.org/W2141504882","https://openalex.org/W2144087043","https://openalex.org/W2154909745","https://openalex.org/W2166293920","https://openalex.org/W2171863291","https://openalex.org/W2172060328","https://openalex.org/W2186615578","https://openalex.org/W2255548496","https://openalex.org/W2302098303","https://openalex.org/W2337480911","https://openalex.org/W2477242951","https://openalex.org/W2536548552","https://openalex.org/W2540422252","https://openalex.org/W2582938728","https://openalex.org/W2604756280","https://openalex.org/W2751989915","https://openalex.org/W2766026515","https://openalex.org/W2919115771","https://openalex.org/W2964206587","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W189451467","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2769734684","https://openalex.org/W2969678054","https://openalex.org/W2903787673","https://openalex.org/W2777343049","https://openalex.org/W3158338108","https://openalex.org/W2584285084"],"abstract_inverted_index":{"Cache":[0],"side-channel":[1,26,72],"attacks":[2,27,58,73,168],"aim":[3],"to":[4,47,69,131],"breach":[5],"the":[6,20,54,88,96,102,105,108,119,123,136,150,161],"confidentiality":[7],"of":[8,25,31,56,122],"a":[9,29,66,80,117,129,144],"computer":[10],"system":[11],"and":[12,41,59,74,92,110,141,169],"extract":[13],"sensitive":[14],"secrets":[15],"through":[16],"CPU":[17],"caches.":[18],"In":[19],"past":[21],"years,":[22],"different":[23,38,154,167],"types":[24],"targeting":[28],"variety":[30],"cache":[32,71],"architectures":[33],"have":[34,43],"been":[35,45,62],"demonstrated.":[36],"Meanwhile,":[37],"defense":[39,145],"methods":[40],"systems":[42],"also":[44],"designed":[46],"mitigate":[48],"these":[49,57],"attacks.":[50],"However,":[51],"quantitatively":[52],"evaluating":[53,70],"effectiveness":[55],"defenses":[60],"has":[61],"challenging.":[63],"We":[64],"propose":[65],"generic":[67],"approach":[68],"defenses.":[75,170],"Specifically,":[76],"our":[77],"method":[78,163],"builds":[79],"deep":[81],"neural":[82,103,124],"network":[83,125],"with":[84],"its":[85,93],"inputs":[86,109],"as":[87,95,128],"adversary's":[89],"observed":[90],"information,":[91],"outputs":[94,111],"victim's":[97],"execution":[98],"traces.":[99],"By":[100],"training":[101],"network,":[104],"relationship":[106],"between":[107],"can":[112,126,138,164],"be":[113],"automatically":[114],"discovered.":[115],"As":[116],"result,":[118],"prediction":[120],"accuracy":[121],"serve":[127],"metric":[130],"quantify":[132],"how":[133,142],"much":[134],"information":[135,151],"adversary":[137],"obtain":[139],"correctly,":[140],"effective":[143],"solution":[146],"is":[147],"in":[148],"reducing":[149],"leakage":[152],"under":[153],"attack":[155],"scenarios.":[156],"Our":[157],"evaluation":[158],"suggests":[159],"that":[160],"proposed":[162],"effectively":[165],"evaluate":[166]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
