{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T16:25:39Z","timestamp":1775319939749,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/milcom.2017.8170812","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T17:40:39Z","timestamp":1513014039000},"page":"255-260","source":"Crossref","is-referenced-by-count":11,"title":["Quantifying information leakage in a processor caused by the execution of instructions"],"prefix":"10.1109","author":[{"given":"Baki","family":"Berkay Yilmaz","sequence":"first","affiliation":[]},{"given":"Robert","family":"Callan","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","author":"heinzel","year":"2002","journal-title":"Spectrum and spectral density estimation by the Discrete Fourier transform (DFT) including a comprehensive list of window functions and some new at-top windows"},{"key":"ref30","author":"alan","year":"1989","journal-title":"Discrete-Time Signal Processing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"ref12","first-page":"388","article-title":"Differential power analysis: leaking secrets","author":"kocher","year":"0","journal-title":"Proceedings of CRYPTO&#x2019;99 Springer Lecture Notes in computer science"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-319-08302-5_15","article-title":"The temperature side channel and heating fault attacks","volume":"8419","author":"hutter","year":"2014","journal-title":"Smart Card Research and Advanced Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.54"},{"key":"ref15","article-title":"Cache games - bringing access-based cache attacks on AES to practice","author":"bangerter","year":"2011","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"ref16","first-page":"803","article-title":"Crypt-analysis of block ciphers implemented on computers with cache","author":"tsunoo","year":"0","journal-title":"Proceedings of the International Symposium on Information Theory and Its Applications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"ref18","first-page":"849","article-title":"Gsmem: Data exfiltration from air-gapped computers over gsm frequencies","author":"guri","year":"0","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(86)90125-2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref6","first-page":"251","article-title":"Electromagnetic analysis: concrete results","author":"gandolfi","year":"0","journal-title":"Cryptographic Hardware and Embedded Systems ? CHES 2001"},{"key":"ref29","author":"callan","year":"2017","journal-title":"Analyzing software using unintentional electromagnetic emanations from computing devices"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2010.5711257"},{"key":"ref8","article-title":"Remote Timing Attacks are Practical","author":"boneh","year":"2003","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024778"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"},{"key":"ref9","first-page":"398","article-title":"Towards sound countermeasures to counteract power-analysis attacks","author":"chari","year":"0","journal-title":"Proceedings of CRYPTO&#x2019;99 Springer Lecture Notes in computer science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"ref20","first-page":"170","article-title":"Capacity estimation of non-synchronous covert channels","author":"wang","year":"0","journal-title":"Distributed Computing Systems Workshops 2005 25th IEEE International Conference on"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2010.5711259"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2237378"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2262019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034143"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2191682"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046220"}],"event":{"name":"2017 IEEE Military Communications Conference (MILCOM)","location":"Baltimore, MD","start":{"date-parts":[[2017,10,23]]},"end":{"date-parts":[[2017,10,25]]}},"container-title":["MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125230\/8170714\/08170812.pdf?arnumber=8170812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T17:31:43Z","timestamp":1570469503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8170812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/milcom.2017.8170812","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}