{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T06:09:12Z","timestamp":1758089352184,"version":"3.44.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11133021","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer"],"prefix":"10.1109","author":[{"given":"Junkai","family":"Liang","sequence":"first","affiliation":[{"name":"Peking University,School of Computer Science"}]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering"}]},{"given":"Daqi","family":"Hu","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering"}]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering"}]},{"given":"Yuejian","family":"Fang","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering"}]},{"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[{"name":"Peking University,School of Computer Science"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335750"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3153084"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"},{"key":"ref6","article-title":"The picnic signature scheme","author":"Chase","year":"2020","journal-title":"Submission to NIST Post-Quantum Cryptography project"},{"journal-title":"Github","article-title":"libsnark","year":"2014","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3232813"},{"journal-title":"Github","article-title":"Zokrates\/zokrates","year":"2021","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3656998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853210"},{"article-title":"Half-double: Hammering from the next row over","volume-title":"USENIX Security Symposium","author":"Kogler","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179450"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354197"},{"key":"ref16","first-page":"1767","article-title":"Big numbers-big troubles: Systematically analyzing nonce leakage in ({EC) DSA} implementations","volume-title":"29th USENIX Security Symposium (USENIX Security 20","author":"Weiser"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.146-168"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417272"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00046"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.169-195"},{"key":"ref23","first-page":"1","article-title":"Flip Feng Shui: Hammering a needle in the software stack","volume-title":"USENIX Security Symposium","author":"Razavi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560673"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54776-8_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00048"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref30","first-page":"781","article-title":"Succinct {NonInteractive} zero knowledge for a von neumann architecture","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.23"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2856449"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"ref35","first-page":"565","article-title":"{DRAMA}: Exploiting {DRAM} addressing for {Cross-CPU} attacks","volume-title":"25th USENIX security symposium (USENIX security 16","author":"Pessl"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247671"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3657355"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3658468"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2025,6,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11133021.pdf?arnumber=11133021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T05:43:41Z","timestamp":1758001421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11133021","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}