{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:45:37Z","timestamp":1751093137401,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355035"},{"type":"electronic","value":"9783031355042"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35504-2_2","type":"book-chapter","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T08:01:47Z","timestamp":1686297707000},"page":"24-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Finger in\u00a0the\u00a0Power: How to\u00a0Fingerprint PCs by\u00a0Monitoring Their Power Consumption"],"prefix":"10.1007","author":[{"given":"Marina","family":"Botvinnik","sequence":"first","affiliation":[]},{"given":"Tomer","family":"Laor","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Rokicki","sequence":"additional","affiliation":[]},{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[]},{"given":"Yossi","family":"Oren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Abel, A., Reineke, J.: uops.info: Characterizing latency, throughput, and port usage of instructions on intel microarchitectures. In: ASPLOS (2019)","DOI":"10.1145\/3297858.3304062"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Alaca, F., van Oorschot, P.C.: Device fingerprinting for augmenting web authentication: classification and analysis of methods. In: ACSAC, pp. 289\u2013301 (2016)","DOI":"10.1145\/2991079.2991091"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Cherkaoui, A., Bossuet, L., Seitz, L., Selander, G., Borgaonkar, R.: New paradigms for access control in constrained environments. In: ReCoSoC. IEEE (2014)","DOI":"10.1109\/ReCoSoC.2014.6861362"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cohen, Y., et al.: Hammerscope: observing DRAM power consumption using rowhammer. In: CCS (2022)","DOI":"10.1145\/3548606.3560688"},{"issue":"6","key":"2_CR5","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1049\/iet-cdt.2014.0028","volume":"8","author":"B Colombier","year":"2014","unstructured":"Colombier, B., Bossuet, L.: Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. 8(6), 274\u2013287 (2014)","journal-title":"IET Comput. Digit. Tech."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Frigo, P., Giuffrida, C., Bos, H., Razavi, K.: Grand pwning unit: accelerating microarchitectural attacks with the GPU. In: S &P (2018)","DOI":"10.1109\/SP.2018.00022"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"van Goethem, T., Scheepers, W., Preuveneers, D., Joosen, W.: Accelerometer-based device fingerprinting for multi-factor mobile authentication. In: 8th International Symposium on Engineering Secure Software and Systems (ESSoS) (2016)","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Gras, B., Giuffrida, C., Kurth, M., Bos, H., Razavi, K.: Absynthe: automatic blackbox side-channel synthesis on commodity microarchitectures. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.23018"},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2425248.2425252","volume":"40","author":"M H\u00e4hnel","year":"2012","unstructured":"H\u00e4hnel, M., D\u00f6bel, B., V\u00f6lp, M., H\u00e4rtig, H.: Measuring energy consumption for short code paths using RAPL. SIGMETRICS Perform. Eval. Rev. 40(3), 13\u201317 (2012)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"issue":"9","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Hupperich, T., Hosseini, H., Holz, T.: Leveraging sensor fingerprinting for mobile device authentication. In: DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_19"},{"key":"2_CR12","unstructured":"Intel: Running Average Power Limit Energy Reporting\/INTEL-SA-00389. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/running-average-power-limit-energy-reporting.html (2022)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kalyanaraman, M., Orshansky, M.: Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. In: HOST (2013)","DOI":"10.1109\/HST.2013.6581558"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Khan, K.N., Hirki, M., Niemi, T., Nurminen, J.K., Ou, Z.: RAPL in action: experiences in using RAPL for power measurements. ACM Trans. Model. Perform. Evaluation Comput. Syst. 3(2), 9:1\u20139:26 (2018)","DOI":"10.1145\/3177754"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"von Kistowski, J., Block, H., Beckett, J., Spradling, C., Lange, K., Kounev, S.: Variations in CPU power consumption. In: ICPE, pp. 147\u2013158. ACM (2016)","DOI":"10.1145\/2851553.2851567"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. In: S &P (2005)","DOI":"10.1109\/SP.2005.18"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Kumar, R., Burleson, W.P.: On design of a highly secure PUF based on non-linear current mirrors. In: HOST, pp. 38\u201343. IEEE Computer Society (2014)","DOI":"10.1109\/HST.2014.6855565"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Laor, T., et al.: DrawnApart: a device identification technique based on remote GPU fingerprinting. In: NDSS (2022)","DOI":"10.14722\/ndss.2022.24093"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Avoine, G., Baudry, B., Nikiforakis, N.: Morellian analysis for browsers: making web authentication stronger with canvas fingerprinting. In: DIMVA (2019)","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: S &P (2016)","DOI":"10.1109\/SP.2016.57"},{"key":"2_CR22","unstructured":"Lipp, M., Gruss, D., Schwarz, M.: AMD prefetch attacks through power and time. In: USENIX Security Symposium (2022)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Lipp, M., et al.: PLATYPUS: software-based power side-channel attacks on x86. In: S &P (2021)","DOI":"10.1109\/SP40001.2021.00063"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Liu, C., Chakraborty, A., Chawla, N., Roggel, N.: Frequency throttling side-channel attack. In: CCS (2022)","DOI":"10.1145\/3548606.3560682"},{"key":"2_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Boston, MA (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Marchand, C., Bossuet, L., Mureddu, U., Bochard, N., Cherkaoui, A., Fischer, V.: Implementation and characterization of a physical unclonable function for IoT: a case study with the TERO-PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 97\u2013109 (2018)","DOI":"10.1109\/TCAD.2017.2702607"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: CHES (1999)","DOI":"10.1007\/3-540-48059-5_14"},{"key":"2_CR28","unstructured":"Moenig, M.: Webgl2: EXT_disjoint_timer_query_webgl2 failing in beta of 65 (2018). https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=820891"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Schwarz, M.: CPU port contention without SMT. In: ESORICS (2022)","DOI":"10.1007\/978-3-031-17143-7_11"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Rokicki, T., Maurice, C., Botvinnik, M., Oren, Y.: Port contention goes portable: port contention side channels in web browsers. In: ASIACCS (2022)","DOI":"10.1145\/3488932.3517411"},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"Ruhrmair, U., Solter, J.: PUF modeling attacks: an introduction and overview. https:\/\/doi.org\/10.7873\/DATE2014.361","DOI":"10.7873\/DATE2014.361"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez-Rola, I., Santos, I., Balzarotti, D.: Clock around the clock: time-based device fingerprinting. In: CCS (2018)","DOI":"10.1145\/3243734.3243796"},{"key":"2_CR33","unstructured":"Schaller, A., et al.: Intrinsic rowhammer pufs: leveraging the rowhammer effect for improved security. CoRR abs\/1902.04444 (2019)"},{"issue":"3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TDSC.2018.2822298","volume":"16","author":"A Schaller","year":"2019","unstructured":"Schaller, A., et al.: Decay-based DRAM pufs in commodity devices. IEEE Trans. Dependable Secur. Comput. 16(3), 462\u2013475 (2019)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Schellenberg, F., Gnad, D.R.E., Moradi, A., Tahoori, M.B.: An inside job: remote power analysis attacks on FPGAs. In: DATE (2018)","DOI":"10.23919\/DATE.2018.8342177"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Schwarzl, M., Lipp, M., Masters, J., Gruss, D.: Netspectre: read arbitrary memory over network. In: ESORICS (2019)","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC, pp. 9\u201314. IEEE (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Karimian, N., Yan, W., Chandy, J.A.: Dram-based intrinsic physically unclonable functions for system-level security and authentication. IEEE Trans. Very Large Scale Integr. Syst. 25(3), 1085\u20131097 (2017)","DOI":"10.1109\/TVLSI.2016.2606658"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Tian, S., Xiong, W., Giechaskiel, I., Rasmussen, K., Szefer, J.: Fingerprinting cloud FPGA infrastructures. In: FPGA (2020)","DOI":"10.1145\/3373087.3375322"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Trampert, L., Rossow, C., Schwarz, M.: Browser-based CPU fingerprinting. In: ESORICS (2022)","DOI":"10.1007\/978-3-031-17143-7_5"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Vijayakumar, A., Kundu, S.: A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics. In: DATE, pp. 653\u2013658. ACM (2015)","DOI":"10.7873\/DATE.2015.0522"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Wang, Y., Paccagnella, R., He, E.T., Shacham, H., Fletcher, C.W., Kohlbrenner, D.: Hertzbleed: turning power side-channel attacks into remote timing attacks on x86. In: USENIX Security Symposium (2022)","DOI":"10.1109\/MM.2023.3274619"},{"key":"2_CR43","unstructured":"Yang, L.,et al.: Remote attacks on speech recognition systems using sound from power supply. In: USENIX Security Symposium (2023)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35504-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T23:03:20Z","timestamp":1688511800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35504-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355035","9783031355042"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35504-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva2023.de\/org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}