{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:52:08Z","timestamp":1767772328923,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0223"],"award-info":[{"award-number":["FA9550-14-1-0223"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-16-C-7620"],"award-info":[{"award-number":["FA8650-16-C-7620"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318934, 1320717, and CCF-1161821"],"award-info":[{"award-number":["1318934, 1320717, and CCF-1161821"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,18]]},"DOI":"10.1145\/2931037.2931065","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T08:33:29Z","timestamp":1467880409000},"page":"401-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Zero-overhead profiling via EM emanations"],"prefix":"10.1145","author":[{"given":"Robert","family":"Callan","sequence":"first","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Farnaz","family":"Behrang","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Alessandro","family":"Orso","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786868"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752713"},{"key":"e_1_3_2_1_3_1","volume-title":"The EM side-channel(s): attacks and assessment methodologies. In http:\/\/www.research.ibm.com\/intsec\/emf-paper.ps","author":"Agrawal D.","year":"2002","unstructured":"D. Agrawal, B. Archambeult, J. R. Rao, and P. Rohatgi. The EM side-channel(s): attacks and assessment methodologies. In http:\/\/www.research.ibm.com\/intsec\/emf-paper.ps, 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586104"},{"key":"e_1_3_2_1_5_1","volume-title":"Accessed","author":"ARM","year":"2016","unstructured":"ARM Cortex-A9 performance monitoring unit. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm. doc.ddi0388f\/BEHEDIHI.html, Accessed 1 May 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/243846.243857"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2191964"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/574407"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.28"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"A survey of monte carlo tree search methods. Computational Intelligence and AI in Games","volume":"4","author":"Browne C. B.","year":"2012","unstructured":"C. B. Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez, S. Samothrakis, and S. Colton. A survey of monte carlo tree search methods. Computational Intelligence and AI in Games, IEEE Transactions on, 4(1):1\u201343, 2012.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070506"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2696523.2696532"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512542"},{"key":"e_1_3_2_1_19_1","unstructured":"B. Durak. Controlled CPU TEMPEST emanations. http:\/\/cryptome.org\/tempest-cpu.htm 1999."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1985581.1985585"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_13"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795630"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(86)90125-2"},{"key":"e_1_3_2_1_26_1","volume-title":"Accessed","author":"Intel","year":"2016","unstructured":"Intel performance counter monitor. https:\/\/software.intel. com\/en-us\/articles\/intel-performance-counter-monitor, Accessed 1 May 2016."},{"key":"e_1_3_2_1_27_1","volume-title":"Accessed","author":"Intel","year":"2016","unstructured":"Intel VTune amplifier. https:\/\/software.intel.com\/en-us\/intel-vtune-amplifier-xe, Accessed 1 May 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977660"},{"key":"e_1_3_2_1_29_1","volume-title":"eavesdropping risks of computer displays. The complete unofficial TEMPEST web page: http:\/\/www.eskimo.com\/\u02dcjoelm\/tempest.html","author":"Khun M. G.","year":"2003","unstructured":"M. G. Khun. Compromising emanations: eavesdropping risks of computer displays. The complete unofficial TEMPEST web page: http:\/\/www.eskimo.com\/\u02dcjoelm\/tempest.html, 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(85)90084-0"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939399.1939426"},{"key":"e_1_3_2_1_32_1","unstructured":"C. Lattner. LLVM. http:\/\/llvm.org\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Accessed","author":"Lauterbach","year":"2016","unstructured":"Lauterbach development tools. http:\/\/www.lauterbach.com, Accessed 1 May 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5109-5"},{"key":"e_1_3_2_1_35_1","volume-title":"Springer","author":"Longo J.","year":"2015","unstructured":"J. Longo, E. De Mulder, D. Page, and M. Tunstall. SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. In Cryptographic Hardware and Embedded Systems\u2013CHES 2015, pages 620\u2013640. Springer, 2015."},{"key":"e_1_3_2_1_36_1","first-page":"304","volume-title":"Security and Privacy in Communication Networks","author":"Msgna M.","unstructured":"M. Msgna, K. Markantonakis, and K. Mayes. The B-side of side channel leakage: Control flow security in embedded systems. In Security and Privacy in Communication Networks, pages 288\u2013304. Springer, 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_11"},{"key":"e_1_3_2_1_38_1","first-page":"280","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Msgna M.","unstructured":"M. Msgna, K. Markantonakis, D. Naccache, and K. Mayes. Verifying software integrity in embedded systems: A side channel approach. In Constructive Side-Channel Analysis and Secure Design, pages 261\u2013280. Springer, 2014."},{"key":"e_1_3_2_1_39_1","first-page":"388","volume-title":"Automated Software Engineering (ASE), 2013 IEEE\/ACM 28th International Conference on","author":"Ohmann P.","unstructured":"P. Ohmann and B. Liblit. Lightweight control-flow instrumentation and postmortem analysis in support of debugging. In Automated Software Engineering (ASE), 2013 IEEE\/ACM 28th International Conference on, pages 378\u2013388. IEEE, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1214056"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/936052"},{"key":"e_1_3_2_1_42_1","volume-title":"Dynamic time warping algorithm review","author":"Senin P.","year":"2008","unstructured":"P. Senin. Dynamic time warping algorithm review. 2008."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/INTERACT.2005.3"},{"key":"e_1_3_2_1_44_1","unstructured":"Software-artifact infrastructure repository. http:\/\/sir.unl.edu\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755784"},{"key":"e_1_3_2_1_46_1","volume-title":"Ephemeral instrumentation for lightweight program profiling","author":"Traub O.","year":"2000","unstructured":"O. Traub, S. Schechter, and M. D. Smith. Ephemeral instrumentation for lightweight program profiling, 2000."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190268"},{"key":"e_1_3_2_1_49_1","volume-title":"Contributions to correlational analysis","author":"Wherry R.","year":"1984","unstructured":"R. Wherry. Contributions to correlational analysis. Academic Press, 1984."},{"key":"e_1_3_2_1_50_1","unstructured":"J. Young. How old is TEMPEST? Online response collection http:\/\/cryptome.org\/tempest-old.htm 2000."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"}],"event":{"name":"ISSTA '16: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Saarbr\u00fccken Germany","acronym":"ISSTA '16"},"container-title":["Proceedings of the 25th International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2931037.2931065","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2931037.2931065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:30:12Z","timestamp":1763458212000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":51,"alternative-id":["10.1145\/2931037.2931065","10.1145\/2931037"],"URL":"https:\/\/doi.org\/10.1145\/2931037.2931065","relation":{},"subject":[],"published":{"date-parts":[[2016,7,18]]},"assertion":[{"value":"2016-07-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}