{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:52:33Z","timestamp":1772805153199,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,13]],"date-time":"2015-06-13T00:00:00Z","timestamp":1434153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0223"],"award-info":[{"award-number":["FA9550-14-1-0223"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318934"],"award-info":[{"award-number":["1318934"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,13]]},"DOI":"10.1145\/2749469.2750394","type":"proceedings-article","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T10:36:25Z","timestamp":1432636585000},"page":"592-603","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["FASE"],"prefix":"10.1145","author":[{"given":"Robert","family":"Callan","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Alenka","family":"Zaji\u0107","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2015,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"key":"e_1_3_2_1_2_1","first-page":"29","volume-title":"The EM side-channel(s),\" in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES)","author":"Agrawal D.","year":"2002"},{"key":"e_1_3_2_1_3_1","volume-title":"The EM side-channel(s): attacks and assessment methodologies","author":"Agrawal D.","year":"2002"},{"key":"e_1_3_2_1_4_1","volume-title":"Statistical Treatment of Analytical Data","author":"Alfassi Z.","year":"2009"},{"key":"e_1_3_2_1_5_1","volume-title":"Acoustic side-channel attacks on printers,\" in Proceedings of the USENIX Security Symposium","author":"Backes M.","year":"2010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_7_1","first-page":"128","volume-title":"Information Leakage Discovery Techniques to Enhance Secure Chip Design,\" in Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"Barenghi A.","year":"2011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024778"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/151116"},{"key":"e_1_3_2_1_10_1","first-page":"432","volume-title":"2014 Twenty-Ninth Annual IEEE. IEEE","author":"Burton E. A.","year":"2014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_2_1_12_1","first-page":"13","volume-title":"Template attacks,\" in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES)","author":"Chari S.","year":"2002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.233222"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20050176"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/b100747"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_19"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506447_4"},{"key":"e_1_3_2_1_20_1","first-page":"158","volume-title":"DES and Differential power analysis (the duplication method),\" in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES)","author":"Goubin L.","year":"1999"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.658619"},{"key":"e_1_3_2_1_22_1","first-page":"227","volume-title":"Symposium Record. Compatibility in the Loop., IEEE International Symposium on. IEEE","author":"Hardin K. B.","year":"1994"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795630"},{"key":"e_1_3_2_1_24_1","volume-title":"eavesdropping risks of computer displays,\" The complete unofficial TEMPEST web page: http:\/\/www.eskimo.com\/~joelm\/tempest.html","author":"Khun M. G.","year":"2003"},{"key":"e_1_3_2_1_25_1","first-page":"388","article-title":"Differential power analysis: leaking secrets","author":"Kocher P.","year":"1999","journal-title":"Proceedings of the International Cryptology Conference"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"P. Lee J. Lee D.-k. Yoon J. Choi and S. Hong \"Analysis of DRAM EMI dependence on data pattern and power delivery design using a near-field EMI scanner \" in Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility 2008. APEMC 2008. Asia-Pacific Symposium on. IEEE 2008 pp. 271--274. P. Lee J. Lee D.-k. Yoon J. Choi and S. Hong \"Analysis of DRAM EMI dependence on data pattern and power delivery design using a near-field EMI scanner \" in Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility 2008. APEMC 2008. Asia-Pacific Symposium on. IEEE 2008 pp. 271--274.","DOI":"10.1109\/APEMC.2008.4559864"},{"key":"e_1_3_2_1_27_1","first-page":"144","volume-title":"Power analysis attacks of modular exponentiation in smart cards,\" in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES)","author":"Messerges T. S.","year":"1999"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763163"},{"key":"e_1_3_2_1_29_1","volume-title":"1st International Conference Advanced Data Analysis, Business Analytics and Intelligence","author":"Palshikar G.","year":"2009"},{"key":"e_1_3_2_1_30_1","volume-title":"Introduction to Electromagnetic Compatibility","author":"Paul C. R.","year":"2006","edition":"2"},{"key":"e_1_3_2_1_31_1","first-page":"1167","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE), 2012","author":"Perin G.","year":"2012"},{"key":"e_1_3_2_1_32_1","volume-title":"Dorling Kindersley","author":"Rappaport T.","year":"2009"},{"key":"e_1_3_2_1_33_1","unstructured":"A. Shamir and E. Tromer \"Acoustic cryptanalysis (On nosy people and noisy machines) \" http:\/\/tau.ac.il\/~tromer\/acoustic\/. A. Shamir and E. Tromer \"Acoustic cryptanalysis (On nosy people and noisy machines) \" http:\/\/tau.ac.il\/~tromer\/acoustic\/."},{"key":"e_1_3_2_1_34_1","first-page":"21","article-title":"Spectrum analysis on cryptographic modules to counteract side-channel attacks","volume":"9","author":"Sugawara T.","year":"2009","journal-title":"EMC"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/575787"},{"key":"e_1_3_2_1_36_1","first-page":"803","article-title":"Crypt-analysis of block ciphers implemented on computers with cache","author":"Tsunoo Y.","year":"2002","journal-title":"Proceedings of the International Symposiumon Information Theory and its Applications"},{"key":"e_1_3_2_1_37_1","first-page":"1366","volume-title":"2013 Twenty-Eighth Annual IEEE","author":"Wang Y.","year":"2013"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"issue":"3","key":"e_1_3_2_1_39_1","first-page":"1","article-title":"Experimental demonstration of electromagnetic information leakage from modern processor-memory systems","volume":"99","author":"Zajic A.","year":"2014","journal-title":"IEEE Transactions on Electromagnetic Compatibility"}],"event":{"name":"ISCA '15: The 42nd Annual International Symposium on Computer Architecture","location":"Portland Oregon","acronym":"ISCA '15","sponsor":["IEEE TCCA IEEE Computer Society Technical Committee on Computer Architecture","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 42nd Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2749469.2750394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2749469.2750394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:00:40Z","timestamp":1750215640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2749469.2750394"}},"subtitle":["finding amplitude-modulated side-channel emanations"],"short-title":[],"issued":{"date-parts":[[2015,6,13]]},"references-count":39,"alternative-id":["10.1145\/2749469.2750394","10.1145\/2749469"],"URL":"https:\/\/doi.org\/10.1145\/2749469.2750394","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2872887.2750394","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,6,13]]},"assertion":[{"value":"2015-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}