{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:23:48Z","timestamp":1765887828675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,6]],"date-time":"2015-11-06T00:00:00Z","timestamp":1446768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,6]]},"DOI":"10.1145\/2875913.2875934","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T16:59:00Z","timestamp":1476205140000},"page":"30-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["A Study on Power Side Channels on Mobile Devices"],"prefix":"10.1145","author":[{"given":"Lin","family":"Yan","sequence":"first","affiliation":[{"name":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Xiangqun","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[{"name":"Key Laboratory of High-Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android developers - ActivityManager refernces. http:\/\/developer.android.com\/reference\/android\/app\/ActivityManager.html#getRunningTasks(int).  Android developers - ActivityManager refernces. http:\/\/developer.android.com\/reference\/android\/app\/ActivityManager.html#getRunningTasks(int)."},{"key":"e_1_3_2_1_2_1","unstructured":"Monsoon Power Monitor. https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/.  Monsoon Power Monitor. https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752713"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology (CRYPTO '97)","author":"Biham E.","year":"1997","unstructured":"E. Biham and A. Shamir . Differential fault analysis of secret key cryptosystems . In Advances in Cryptology (CRYPTO '97) , pages 513 -- 525 . Springer , 1997 . E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology (CRYPTO '97), pages 513--525. Springer, 1997."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242656"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"Brier E.","year":"2002","unstructured":"E. Brier and M. Joye . Weierstra\u00df elliptic curves and side-channel attacks . In Public Key Cryptography , pages 335 -- 345 . Springer Berlin Heidelberg , 2002 . E. Brier and M. Joye. Weierstra\u00df elliptic curves and side-channel attacks. In Public Key Cryptography, pages 335--345. Springer Berlin Heidelberg, 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Brumley D.","year":"2003","unstructured":"D. Brumley and D. Boneh . Remote timing attacks are practical . In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 . USENIX Association , 2003 . D. Brumley and D. Boneh. Remote timing attacks are practical. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12. USENIX Association, 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX annual technical conference","author":"Carroll A.","year":"2010","unstructured":"A. Carroll and G. Heiser . An analysis of power consumption in a smartphone . In USENIX annual technical conference , volume 14 , 2010 . A. Carroll and G. Heiser. An analysis of power consumption in a smartphone. In USENIX annual technical conference, volume 14, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology (CRYPTO 99)","author":"Chari S.","year":"1999","unstructured":"S. Chari , C. S. Jutla , J. R. Rao , and P. Rohatgi . Towards sound approaches to counteract power-analysis attacks . In Advances in Cryptology (CRYPTO 99) , pages 398 -- 412 . Springer , 1999 . S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In Advances in Cryptology (CRYPTO 99), pages 398--412. Springer, 1999."},{"key":"e_1_3_2_1_12_1","first-page":"1037","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium","author":"Chen Q. A.","year":"2014","unstructured":"Q. A. Chen , Z. Qian , and Z. M. Mao . Peeking into your app without actually seeing it: UI state inference and novel Android attacks . In Proceedings of the 23rd USENIX Conference on Security Symposium , pages 1037 -- 1052 , Berkeley, CA, USA , 2014 . USENIX Association. Q. A. Chen, Z. Qian, and Z. M. Mao. Peeking into your app without actually seeing it: UI state inference and novel Android attacks. In Proceedings of the 23rd USENIX Conference on Security Symposium, pages 1037--1052, Berkeley, CA, USA, 2014. USENIX Association."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.167"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486801"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.110"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"e_1_3_2_1_22_1","first-page":"189","volume-title":"USENIX Security symposium","author":"Kim T.","year":"2012","unstructured":"T. Kim , M. Peinado , and G. Mainar-Ruiz . Stealthmem: System-level protection against cache-based side channel attacks in the cloud . In USENIX Security symposium , pages 189 -- 204 , 2012 . T. Kim, M. Peinado, and G. Mainar-Ruiz. Stealthmem: System-level protection against cache-based side channel attacks in the cloud. In USENIX Security symposium, pages 189--204, 2012."},{"key":"e_1_3_2_1_23_1","unstructured":"P. Kocher J. Jaffe and B. Jun. Introduction to differential power analysis and related attacks. http:\/\/www.cryptography.com\/resources\/whitepapers\/DPATechInfo.pdf 1998.  P. Kocher J. Jaffe and B. Jun. Introduction to differential power analysis and related attacks. http:\/\/www.cryptography.com\/resources\/whitepapers\/DPATechInfo.pdf 1998."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology (CRYPTO '99)","author":"Kocher P.","year":"1999","unstructured":"P. Kocher , J. Jaffe , and B. Jun . Differential power analysis . In Advances in Cryptology (CRYPTO '99) , pages 388 -- 397 . Springer , 1999 . P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology (CRYPTO '99), pages 388--397. Springer, 1999."},{"key":"e_1_3_2_1_25_1","first-page":"104","volume-title":"RSA, DSS, and other systems. In Advances in Cryptology (CRYPTO '96)","author":"Kocher P. C.","year":"1996","unstructured":"P. C. Kocher . Timing attacks on implementations of Diffie-Hellman , RSA, DSS, and other systems. In Advances in Cryptology (CRYPTO '96) , pages 104 -- 113 . Springer , 1996 . P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology (CRYPTO '96), pages 104--113. Springer, 1996."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.11"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568321"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568321"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23049"},{"key":"e_1_3_2_1_30_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard S.","year":"2008","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power analysis attacks: Revealing the secrets of smart cards , volume 31 . Springer Science & Business Media , 2008 . S. Mangard, E. Oswald, and T. Popp. Power analysis attacks: Revealing the secrets of smart cards, volume 31. Springer Science & Business Media, 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752374"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedinga of 23rd USENIX Security Symposium, USENIX Association","author":"Michalevsky Y.","year":"2014","unstructured":"Y. Michalevsky , D. Boneh , and G. Nakibly . Gyrophone: Recognizing speech from gyroscope signals . In Proceedinga of 23rd USENIX Security Symposium, USENIX Association , 2014 . Y. Michalevsky, D. Boneh, and G. Nakibly. Gyrophone: Recognizing speech from gyroscope signals. In Proceedinga of 23rd USENIX Security Symposium, USENIX Association, 2014."},{"key":"e_1_3_2_1_34_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Michalevsky Y.","year":"2015","unstructured":"Y. Michalevsky , G. Nakibly , A. Schulman , and D. Boneh . PowerSpy: Location tracking using mobile device power analysis . In 24th USENIX Security Symposium (USENIX Security 15) , Washington, D.C. , Aug. 2015 . USENIX Association. Y. Michalevsky, G. Nakibly, A. Schulman, and D. Boneh. PowerSpy: Location tracking using mobile device power analysis. In 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., Aug. 2015. USENIX Association."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security","author":"M\u00f6ller B.","year":"2001","unstructured":"B. M\u00f6ller . Securing elliptic curve point multiplication against side-channel attacks. In Information Security , pages 324 -- 334 . Springer , 2001 . B. M\u00f6ller. Securing elliptic curve point multiplication against side-channel attacks. In Information Security, pages 324--334. Springer, 2001."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-540-74048-3_4","volume-title":"Dynamic time warping. Information retrieval for music and motion","author":"M\u00fcller M.","year":"2007","unstructured":"M. M\u00fcller . Dynamic time warping. Information retrieval for music and motion , pages 69 -- 84 , 2007 . M. M\u00fcller. Dynamic time warping. Information retrieval for music and motion, pages 69--84, 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.25"},{"key":"e_1_3_2_1_40_1","first-page":"1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"Saponas T. S.","year":"2007","unstructured":"T. S. Saponas , J. Lester , C. Hartung , S. Agarwal , and T. Kohno . Devices that tell on you: Privacy trends in consumer ubiquitous computing . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , pages 5: 1 -- 5 :16. USENIX Association , 2007 . T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 5:1--5:16. USENIX Association, 2007."},{"key":"e_1_3_2_1_41_1","first-page":"17","volume-title":"Proceedings of The 18th Annual Network and Distributed System Security Symposium (NDSS)","volume":"11","author":"Schlegel R.","year":"2011","unstructured":"R. Schlegel , K. Zhang , X.-y. Zhou , M. Intwala , A. Kapadia , and X. Wang . Soundcomber: A stealthy and context-aware sound trojan for smartphones . In Proceedings of The 18th Annual Network and Distributed System Security Symposium (NDSS) , volume 11 , pages 17 -- 33 , 2011 . R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of The 18th Annual Network and Distributed System Security Symposium (NDSS), volume 11, pages 17--33, 2011."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium -","volume":"10","author":"Song D. X.","year":"2001","unstructured":"D. X. Song , D. Wagner , and X. Tian . Timing analysis of keystrokes and timing attacks on SSH . In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 . USENIX Association , 2001 . D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10. USENIX Association, 2001."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS)","author":"Templeman R.","year":"2013","unstructured":"R. Templeman , Z. Rahman , D. Crandall , and A. Kapadia . PlaceRaider: Virtual theft in physical spaces with smartphones . In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS) , Feb. 2013 . R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia. PlaceRaider: Virtual theft in physical spaces with smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS), Feb. 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855769"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250723"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130767"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"e_1_3_2_1_48_1","volume-title":"Spycatcher: The candid autobiography of a senior intelligence officer","author":"Wright P.","year":"1987","unstructured":"P. Wright and P. Greengrass . Spycatcher: The candid autobiography of a senior intelligence officer . Dell Publishing Company , 1987 . P. Wright and P. Greengrass. Spycatcher: The candid autobiography of a senior intelligence officer. Dell Publishing Company, 1987."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2012.6165058"},{"key":"e_1_3_2_1_51_1","first-page":"387","volume-title":"USENIX Annual Technical Conference","author":"Yoon C.","year":"2012","unstructured":"C. Yoon , D. Kim , W. Jung , C. Kang , and H. Cha . AppScope: Application energy metering framework for Android smartphone using kernel activity monitoring . In USENIX Annual Technical Conference , pages 387 -- 400 , 2012 . C. Yoon, D. Kim, W. Jung, C. Kang, and H. Cha. AppScope: Application energy metering framework for Android smartphone using kernel activity monitoring. In USENIX Annual Technical Conference, pages 387--400, 2012."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046772"},{"key":"e_1_3_2_1_53_1","first-page":"17","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09","author":"Zhang K.","year":"2009","unstructured":"K. Zhang and X. Wang . Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems . In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09 , pages 17 -- 32 . USENIX Association , 2009 . K. Zhang and X. Wang. Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, pages 17--32. USENIX Association, 2009."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"}],"event":{"name":"Internetware '15: The Seventh Asia-Pacific Symposium on Internetware","sponsor":["Key Laboratory of High Confidence Software Technologies Key Laboratory of High Confidence Software Technologies, Ministry of Education"],"location":"Wuhan China","acronym":"Internetware '15"},"container-title":["Proceedings of the 7th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2875913.2875934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,6]]},"references-count":57,"alternative-id":["10.1145\/2875913.2875934","10.1145\/2875913"],"URL":"https:\/\/doi.org\/10.1145\/2875913.2875934","relation":{},"subject":[],"published":{"date-parts":[[2015,11,6]]},"assertion":[{"value":"2015-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}