{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T20:57:30Z","timestamp":1775509050491,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179326","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"2306-2320","source":"Crossref","is-referenced-by-count":15,"title":["DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data"],"prefix":"10.1109","author":[{"given":"Yingchen","family":"Wang","sequence":"first","affiliation":[{"name":"University of Texas at Austin"}]},{"given":"Riccardo","family":"Paccagnella","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Alan","family":"Wandke","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Zhao","family":"Gang","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}]},{"given":"Grant","family":"Garrett-Grossman","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"David","family":"Kohlbrenner","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Hovav","family":"Shacham","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Hertzbleed: Turning power side-channel attacks into timing attacks on x86","author":"Wang","year":"2022","journal-title":"USENIX Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"ref4","article-title":"A direct key recovery on SIDH","author":"Maino","year":"2023","journal-title":"EUROCRYPT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417268"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.281-308"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3585-7_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64837-4_29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14423-3_12"},{"key":"ref15","year":"2023","journal-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual: Volume 3B: System Programming Guide, Part 2"},{"key":"ref16","article-title":"Data operand independent timing instruction set architecture (ISA) guidance","year":"2023"},{"key":"ref17","article-title":"Shenango: Achieving high CPU efficiency for latency-sensitive datacenter workloads","author":"Ousterhout","year":"2019","journal-title":"NSDI"},{"key":"ref18","article-title":"Console hacking 2010: Ps3 epic fail","volume-title":"Presented at 27C3","year":"2010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6979"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/9781108854207.008"},{"key":"ref21","article-title":"Big numbers\u2014big troubles: Systematically analyzing nonce leakage in (EC)DSA implementations","author":"Weiser","year":"2020","journal-title":"USENIX Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref23","first-page":"114","article-title":"A public key cryptosystem based on algebraic coding theory","volume":"4244","author":"McEliece","year":"1978","journal-title":"Deep Space Network Progress Report"},{"key":"ref24","article-title":"Classic McEliece: conservative code-based cryptography","author":"Albrecht","year":"2022","journal-title":"National Institute of Standards and Technology, Tech. Rep."},{"key":"ref25","article-title":"Understanding binary-Goppa decoding","author":"Bernstein","year":"2022","journal-title":"Cryptology ePrint Archive, Report 2022\/473"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1142\/9407","volume-title":"Algebraic coding theory (revised edition)","author":"Berlekamp","year":"2015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11006-006-0139-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_11"},{"key":"ref29","volume-title":"The Tangled Web: A Guide to Securing Modern Web Applications.","author":"Zalewski","year":"2011"},{"key":"ref30","article-title":"W3c filter effects module level 1"},{"key":"ref31","article-title":"Canvas composite operations and CSS blend modes leak cross-origin data via timing attacks"},{"key":"ref32","article-title":"Pixel perfect timing attacks with HTML5","author":"Stone","year":"2013","journal-title":"Context Information Security, White Paper"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516712"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"ref35","article-title":"On the effectiveness of mitigations against floating-point timing channels","author":"Kohlbrenner","year":"2017","journal-title":"USENIX Security"},{"key":"ref36","article-title":"SVG filter timing attack"},{"key":"ref37","article-title":"Pixelstealing and history-stealing through floating-point timing side channel"},{"key":"ref38","article-title":"i915_pmu.c"},{"key":"ref39","article-title":"Intel P-State driver"},{"key":"ref40","volume-title":"The OpenCL Specification, Version v3.0.13","year":"2023"},{"key":"ref41","article-title":"stress-ng","author":"King","year":"2022"},{"key":"ref42","article-title":"Trusted browsers for uncertain times","author":"Kohlbrenner","year":"2016","journal-title":"USENIX Security"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179326.pdf?arnumber=10179326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:18:02Z","timestamp":1721452682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179326","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}