{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:55:04Z","timestamp":1756994104362,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030629731"},{"type":"electronic","value":"9783030629748"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62974-8_11","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T13:10:38Z","timestamp":1606223438000},"page":"178-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel"],"prefix":"10.1007","author":[{"given":"Haoyu","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jianwen","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"11_CR1","unstructured":"Alexa: The top 500 sites on the web (2019). https:\/\/www.alexa.com\/topsites"},{"key":"11_CR2","unstructured":"Chen, Q.A., Qian, Z., Mao, Z.M.: Peeking into your app without actually seeing it: UI state inference and novel android attacks. In: Proceedings of the 23rd USENIX Security Symposium, pp. 1037\u20131052 (2014)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Diao, W., Liu, X., Li, Z., Zhang, K.: No pardon for the interruption: New inference attacks on android through interrupt timing analysis. In: Proceedings of the 2016 IEEE Symposium on Security and Privacy, pp. 414\u2013432. IEEE (2016)","DOI":"10.1109\/SP.2016.32"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10618-019-00619-1","volume":"33","author":"H Ismail Fawaz","year":"2019","unstructured":"Ismail Fawaz, H., Forestier, G., Weber, J., Idoumghar, L., Muller, P.-A.: Deep learning for time series classification: a review. Data Min. Knowl. Disc. 33(4), 917\u2013963 (2019). https:\/\/doi.org\/10.1007\/s10618-019-00619-1","journal-title":"Data Min. Knowl. Disc."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 25\u201332. ACM (2000)","DOI":"10.1145\/352600.352606"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSE.2015040101","volume":"6","author":"R Gay","year":"2015","unstructured":"Gay, R., Mantel, H., Sudbrock, H.: An empirical bandwidth analysis of interrupt-related covert channels. Int. J. Secure Softw. Eng. 6(2), 1\u201322 (2015)","journal-title":"Int. J. Secure Softw. Eng."},{"key":"11_CR7","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: A robust scalable website fingerprinting technique. In: Proceedings of the 25th USENIX Security Symposium, pp. 1187\u20131203 (2016)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the 29th IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"11_CR9","unstructured":"Hwu, W.M.W.: GPU Computing Gems, Emerald edn. Elsevier (2011)"},{"key":"11_CR10","unstructured":"inaz2: Abusing interrupts for reliable windows kernel exploitation (2015). https:\/\/www.slideshare.net\/inaz2\/abusing-interrupts-for-reliable-windows-kernel-exploitation-en"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Jana, S., Shmatikov, V.: Memento: learning secrets from process footprints. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 143\u2013157. IEEE (2012)","DOI":"10.1109\/SP.2012.19"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Kotcher, R., Pei, Y., Jumde, P., Jackson, C.: Cross-origin pixel stealing: timing attacks using CSS filters. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1055\u20131062. ACM (2013)","DOI":"10.1145\/2508859.2516712"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, Y., Kim, J., Kim, J.: Stealing webpages rendered on your browser by exploiting GPU vulnerabilities. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 19\u201333. IEEE (2014)","DOI":"10.1109\/SP.2014.9"},{"key":"11_CR14","unstructured":"Lukan, D.: Hooking the system service dispatch table (SSDT) (2014). https:\/\/resources.infosecinstitute.com\/hooking-system-service-dispatch-table-ssdt"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Luo, C., Fei, Y., Luo, P., Mukherjee, S., Kaeli, D.: Side channel power analysis of a GPU AES implementation. In: Proceedings of the 2015 33rd IEEE International Conference on Computer Design, pp. 281\u2013288. IEEE (2015)","DOI":"10.1109\/ICCD.2015.7357115"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Mantel, H., Sudbrock, H.: Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium, pp. 326\u2013340. IEEE (2007)","DOI":"10.1109\/CSF.2007.14"},{"key":"11_CR17","unstructured":"Miller, J., Osmani, A.: Rendering on the web (2019). https:\/\/developers.google.com\/web\/updates\/2019\/02\/rendering-on-the-web"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Naghibijouybari, H., Khasawneh, K.N., Abu-Ghazaleh, N.: Constructing and characterizing covert channels on gpgpus. In: Proceedings of the 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 354\u2013366. IEEE (2017)","DOI":"10.1145\/3123939.3124538"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Naghibijouybari, H., Neupane, A., Qian, Z., Abu-Ghazaleh, N.: Rendered insecure: GPU side channel attacks are practical. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2139\u20132153. ACM (2018)","DOI":"10.1145\/3243734.3243831"},{"key":"11_CR20","unstructured":"Nvidia: Security notice: Nvidia response to \u201crendered insecure: GPU side channel attacks are practical\u201d - November 2018 (2018). https:\/\/shorturl.at\/efJO6"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Olson, L.E., Power, J., Hill, M.D., Wood, D.A.: Border control: sandboxing accelerators. In: Proceedings of the 2015 48th Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 470\u2013481. IEEE (2015)","DOI":"10.1145\/2830772.2830819"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website fingerprinting at internet scale. In: Proceedings of the Network and Distributed System Security Symposium 2016 (2016)","DOI":"10.14722\/ndss.2016.23477"},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2801153","volume":"15","author":"RD Pietro","year":"2016","unstructured":"Pietro, R.D., Lombardi, F., Villani, A.: Cuda leaks: a detailed hack for cuda and a (partial) fix. ACM Trans. Embedded Comput. Syst. 15(1), 15 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Qian, Z., Mao, Z.M., Xie, Y.: Collaborative TCP sequence number inference attack: how to crack sequence number under a second. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 593\u2013604. ACM (2012)","DOI":"10.1145\/2382196.2382258"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Tang, X., Lin, Y., Wu, D., Gao, D.: Towards dynamically monitoring android applications on non-rooted devices in the wild. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 212\u2013223. ACM (2018)","DOI":"10.1145\/3212480.3212504"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., Piessens, F., Strackx, R.: Nemesis: studying microarchitectural timing leaks in rudimentary CPU interrupt logic. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 178\u2013195. ACM (2018)","DOI":"10.1145\/3243734.3243822"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Van Goethem, T., Joosen, W., Nikiforakis, N.: The clock is still ticking: timing attacks in the modern web. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1382\u20131393 (2015)","DOI":"10.1145\/2810103.2813632"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yan, W., Oates, T.: Time series classification from scratch with deep neural networks: a strong baseline. In: Proceedings of the 2017 International Joint Conference on Neural Networks, pp. 1578\u20131585. IEEE (2017)","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Yao, Z., Ma, Z., Liu, Y., Amiri Sani, A., Chandramowlishwaran, A.: Sugar: Secure GPU acceleration in web browsers. In: ACM SIGPLAN Notices, vol. 53, pp. 519\u2013534. ACM (2018)","DOI":"10.1145\/3296957.3173186"},{"key":"11_CR30","unstructured":"Zhang, K., Wang, X.: Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems. In: Proceedings of the 18th USENIX Security Symposium, vol. 20, p. 23 (2009)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, X., et al.: Identity, location, disease and more: Inferring your secrets from android public resources. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017\u20131028. ACM (2013)","DOI":"10.1145\/2508859.2516661"},{"issue":"2","key":"11_CR32","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1515\/popets-2017-0016","volume":"2017","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Diao, W., Liu, X., Li, Z., Zhang, K., Liu, R.: Vulnerable gpu memory management: towards recovering raw data from gpu. Proc. Privacy Enhan. Technol. 2017(2), 57\u201373 (2017)","journal-title":"Proc. Privacy Enhan. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62974-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:08:46Z","timestamp":1607299726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62974-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030629731","9783030629748"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62974-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2020.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}