{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:12:47Z","timestamp":1725772367488},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/ats.2015.17","type":"proceedings-article","created":{"date-parts":[[2016,3,3]],"date-time":"2016-03-03T22:17:51Z","timestamp":1457043471000},"page":"55-60","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Timing Channel Protection for Shared Memory Controllers"],"prefix":"10.1109","author":[{"given":"Guopei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huawei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Memory Systems Cache DRAM Disk","year":"2010","author":"jacob","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2012.24"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","article-title":"On the power of simple branch prediction analysis","author":"acii\u00e7mez","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485972"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"article-title":"Cache-timing attacks on AES","year":"2005","author":"bernstein","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/11967668_15","article-title":"Predicting secret keys via branch prediction","author":"acti\u00e7mez","year":"2006","journal-title":"Topics in Cryptology ? CT-RSA 2007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611776"},{"key":"ref9","article-title":"Cache missing for fun and profit","author":"percival","year":"2005","journal-title":"BSDCan"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835934"}],"event":{"name":"2015 IEEE 24th Asian Test Symposium (ATS)","start":{"date-parts":[[2015,11,22]]},"location":"Mumbai, India","end":{"date-parts":[[2015,11,25]]}},"container-title":["2015 IEEE 24th Asian Test Symposium (ATS)"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/7421875\/7422217\/07422235.pdf?arnumber=7422235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T19:24:34Z","timestamp":1718393074000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/7422235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":12,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/ats.2015.17","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}