ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.01497
  4. Cited By
Theory and Practice of Finding Eviction Sets
v1v2 (latest)

Theory and Practice of Finding Eviction Sets

2 October 2018
Pepe Vila
Boris Köpf
J. Morales
ArXiv (abs)PDFHTML

Papers citing "Theory and Practice of Finding Eviction Sets"

38 / 38 papers shown
Title
Addendum: Systematic Evaluation of Randomized Cache Designs against Cache Occupancy
Addendum: Systematic Evaluation of Randomized Cache Designs against Cache Occupancy
Anirban Chakraborty
Nimish Mishra
Sayandeep Saha
Sarani Bhattacharya
Debdeep Mukhopadhyay
60
2
0
19 Oct 2025
A Distributed Emulation Environment for In-Memory Computing Systems
A Distributed Emulation Environment for In-Memory Computing SystemsInternational Instrumentation and Measurement Technology Conference (I2MTC), 2025
Eleni Bougioukou
Anastasios Petropoulos
Nikolaos Toulgaridis
Theodoros Chatzimichail
Theodore Antonakopoulos
48
0
0
09 Oct 2025
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an EyeIEEE Symposium on Security and Privacy (S&P), 2025
Bradley Morgan
Gal Horowitz
Sioli O'Connell
S. V. Schaik
C. Chuengsatiansup
Daniel Genkin
Olaf Maennel
Paul Montague
Eyal Ronen
Y. Yarom
161
2
0
15 Apr 2025
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Taehun Kim
Hyerean Jang
Youngjoo Shin
191
0
0
13 Mar 2025
RogueRFM: Attacking Refresh Management for Covert-Channel and Denial-of-Service
RogueRFM: Attacking Refresh Management for Covert-Channel and Denial-of-Service
Hritvik Taneja
Moinuddin Qureshi
155
4
0
11 Jan 2025
SoK: A Systems Perspective on Compound AI Threats and Countermeasures
SoK: A Systems Perspective on Compound AI Threats and Countermeasures
Sarbartha Banerjee
Prateek Sahu
Mulong Luo
Anjo Vahldiek-Oberwagner
N. Yadwadkar
Mohit Tiwari
AAML
273
2
0
20 Nov 2024
RollingCache: Using Runtime Behavior to Defend Against Cache Side
  Channel Attacks
RollingCache: Using Runtime Behavior to Defend Against Cache Side Channel Attacks
Divya Ojha
S. Dwarkadas
119
0
0
16 Aug 2024
TikTag: Breaking ARM's Memory Tagging Extension with Speculative
  Execution
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution
Juhee Kim
Jinbum Park
Sihyeon Roh
Jaeyoung Chung
Youngjoo Lee
Taesoo Kim
Byoungyoung Lee
126
11
0
13 Jun 2024
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public
  Cloud (Extended Version)
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
Josep Torrellas
140
21
0
21 May 2024
Fight Hardware with Hardware: System-wide Detection and Mitigation of
  Side-Channel Attacks using Performance Counters
Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters
Stefano Carnà
Serena Ferracci
Francesco Quaglia
Alessandro Pellegrini
115
17
0
18 Feb 2024
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
No Forking Way: Detecting Cloning Attacks on Intel SGX ApplicationsAsia-Pacific Computer Systems Architecture Conference (ACSA), 2023
Samira Briongos
Ghassan O. Karame
Claudio Soriente
Annika Wilde
170
5
0
04 Oct 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on
  Microarchitectural Optimizations
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural OptimizationsEuropean Symposium on Security and Privacy (Euro S&P), 2022
N. Holtryd
M. Manivannan
P. Stenström
AAML
159
2
0
20 Dec 2022
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate
  Stealthy Fine-Grained Timers
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained TimersInternational Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2022
Haocheng Xiao
S. Ainsworth
SyDa
138
17
0
26 Nov 2022
Chameleon Cache: Approximating Fully Associative Caches with Random
  Replacement to Prevent Contention-Based Cache Attacks
Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks
Thomas Unterluggauer
Austin Harris
Scott D. Constable
Fangfei Liu
Carlos V. Rozas
AAML
92
9
0
29 Sep 2022
Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel
  CPUs
Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel CPUsInternational Symposium on Recent Advances in Intrusion Detection (RAID), 2022
Jan Philipp Thoma
Tim Güneysu
119
13
0
05 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and
  Linker-introduced Leakage
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
206
2
0
03 Aug 2022
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud
  Systems
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud SystemsACM Asia Conference on Computer and Communications Security (AsiaCCS), 2022
T. Tiemann
Zane Weissman
T. Eisenbarth
B. Sunar
205
2
0
23 Feb 2022
CacheFX: A Framework for Evaluating Cache Security
CacheFX: A Framework for Evaluating Cache SecurityACM Asia Conference on Computer and Communications Security (AsiaCCS), 2022
Daniel Genkin
William Kosasih
Fangfei Liu
Anna Trikalinou
Thomas Unterluggauer
Y. Yarom
127
21
0
27 Jan 2022
Practical Timing Side Channel Attacks on Memory Compression
Practical Timing Side Channel Attacks on Memory Compression
Martin Schwarzl
Pietro Borrello
Gururaj Saileshwar
Hanna Müller
Michael Schwarz
Daniel Gruss
138
16
0
16 Nov 2021
Dynamic Process Isolation
Dynamic Process Isolation
Martin Schwarzl
Pietro Borrello
Andreas Kogler
Kenton Varda
T. Schuster
Daniel Gruss
Michael Schwarz
177
11
0
10 Oct 2021
Leaking Control Flow Information via the Hardware Prefetcher
Leaking Control Flow Information via the Hardware Prefetcher
Yun Chen
Ling Pei
Trevor E. Carlson
130
14
0
01 Sep 2021
Util::Lookup: Exploiting key decoding in cryptographic libraries
Util::Lookup: Exploiting key decoding in cryptographic librariesConference on Computer and Communications Security (CCS), 2021
Florian Sieck
Sebastian Berndt
Jan Wichelmann
T. Eisenbarth
69
17
0
10 Aug 2021
Osiris: Automated Discovery of Microarchitectural Side Channels
Osiris: Automated Discovery of Microarchitectural Side ChannelsUSENIX Security Symposium (USENIX Security), 2021
Daniel Weber
A. Ibrahim
Hamed Nemati
Michael Schwarz
C. Rossow
126
72
0
07 Jun 2021
ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
Jan Philipp Thoma
Christian Niesler
D. Funke
G. Leander
P. Mayr
N. Pohl
Lucas Davi
Tim Güneysu
169
20
0
23 Apr 2021
Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh
  Interconnect
Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect
Junpeng Wan
Yanxiang Bi
Zhe Zhou
Zhou Li
95
7
0
08 Mar 2021
Swivel: Hardening WebAssembly against Spectre
Swivel: Hardening WebAssembly against SpectreUSENIX Security Symposium (USENIX Security), 2021
Shravan Narayan
Craig Disselkoen
D. Moghimi
Sunjay Cauligi
Evan Johnson
...
Anjo Vahldiek-Oberwagner
R. Sahita
H. Shacham
Dean Tullsen
D. Stefan
121
68
0
25 Feb 2021
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU
  Systems
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU SystemsInternational Symposium on Computer Architecture (ISCA), 2020
S. B. Dutta
Hoda Naghibijouybari
Nael B. Abu-Ghazaleh
Andres Marquez
Kevin J. Barker
GNN
135
45
0
19 Nov 2020
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical
  Fully-Associative Design
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative DesignUSENIX Security Symposium (USENIX Security), 2020
Gururaj Saileshwar
Moinuddin K. Qureshi
219
98
0
18 Sep 2020
CACHE SNIPER : Accurate timing control of cache evictions
CACHE SNIPER : Accurate timing control of cache evictions
Samira Briongos
Ida Bruhns
Pedro Malagón
T. Eisenbarth
Jose M. Moya
101
1
0
27 Aug 2020
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel
  Attacks! But We Can Fix It
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
Wei Song
Boya Li
Zihan Xue
Zhenzhen Li
Wenhao Wang
Peng Liu
AAML
100
62
0
05 Aug 2020
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit AccessesMicro (MICRO), 2020
Zhi-Li Zhang
Yueqiang Cheng
Dongxi Liu
Surya Nepal
Zhi Wang
Y. Yarom
125
84
0
17 Jul 2020
Flushgeist: Cache Leaks from Beyond the Flush
Flushgeist: Cache Leaks from Beyond the Flush
Pepe Vila
Andreas Abel
Marco Guarnieri
Boris Köpf
Jan Reineke
125
10
0
28 May 2020
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman
T. Tiemann
D. Moghimi
E. Custodio
T. Eisenbarth
B. Sunar
100
82
0
24 Dec 2019
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs
  (Updated and Extended Version)
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs (Updated and Extended Version)
Michael Schwarz
Claudio Canella
Lukas Giner
Daniel Gruss
148
46
0
14 May 2019
RowHammer: A Retrospective
RowHammer: A Retrospective
O. Mutlu
Jeremie S. Kim
166
259
0
22 Apr 2019
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy
  Cache Attacks
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Samira Briongos
Pedro Malagón
Jose M. Moya
T. Eisenbarth
145
96
0
12 Apr 2019
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache AttacksUSENIX Security Symposium (USENIX Security), 2019
Saad Islam
A. Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gülmezoglu
T. Eisenbarth
B. Sunar
LLMSV
160
83
0
01 Mar 2019
Undermining User Privacy on Mobile Devices Using AI
Undermining User Privacy on Mobile Devices Using AI
Berk Gülmezoglu
A. Zankl
M. Caner Tol
Saad Islam
T. Eisenbarth
B. Sunar
136
26
0
27 Nov 2018
1