{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:05:11Z","timestamp":1772906711419,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545405","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"378-382","source":"Crossref","is-referenced-by-count":8,"title":["Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors"],"prefix":"10.1109","author":[{"given":"Nimish","family":"Mishra","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Kharagpur"}]},{"given":"Tridib Lochan","family":"Dutta","sequence":"additional","affiliation":[{"name":"Tezpur University"}]},{"given":"Shubhi","family":"Shukla","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Kharagpur"}]},{"given":"Anirban","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Kharagpur"}]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Kharagpur"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref2","article-title":"Collide+Power: Leaking inaccessible data with software-based power side channels","author":"Kogler","year":"2023","journal-title":"USENIX Security"},{"key":"ref3","year":"2013","journal-title":"Intel 64 and ia-32 architectures software developer manuals"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mm.2023.3274619"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560682"},{"key":"ref6","year":"2022","journal-title":"Rapl advisory"},{"key":"ref7","article-title":"x86_pkg_temp_thermal","year":"2022","journal-title":"Linux-Kernel-Documentation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"ref9","article-title":"Teacher model fingerprinting attacks against transfer learning","author":"Chen","year":"2022","journal-title":"USENIX Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"ref15","article-title":"Robust website fingerprinting through the cache occupancy channel","author":"Shusterman","year":"2019","journal-title":"USENIX Security 2019"},{"key":"ref16","article-title":"Loophole: Timing attacks on shared event loops in chrome","author":"Vila","year":"2017","journal-title":"USENIX Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545405.pdf?arnumber=10545405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:14:34Z","timestamp":1717906474000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545405","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}