{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:11:24Z","timestamp":1776939084403,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore's Agencyfor Science, Technology, And Research under the Human CenteredCyberphysical Systems program"},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["2015-ST-061-CIRC01"],"award-info":[{"award-number":["2015-ST-061-CIRC01"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978323","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"883-894","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Leave Your Phone at the Door"],"prefix":"10.1145","author":[{"given":"Avesta","family":"Hojjati","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Anku","family":"Adhikari","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Katarina","family":"Struckmann","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Edward","family":"Chou","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Thi Ngoc","family":"Tho Nguyen","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Singapore, Singapore"}]},{"given":"Kushagra","family":"Madan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Marianne S.","family":"Winslett","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"William P.","family":"King","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Exposing one of China's cyber espionage units","year":"2013","unstructured":"APT1 : Exposing one of China's cyber espionage units . Mandiant Intelligence Center , 2013 . APT1: Exposing one of China's cyber espionage units. Mandiant Intelligence Center, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"One in every five manufacturing businesses has lost intellectual property to security breaches within the past year","year":"2014","unstructured":"Kaspersky lab survey : One in every five manufacturing businesses has lost intellectual property to security breaches within the past year . Kaspersky Lab press release, August 2014 . Kaspersky lab survey: One in every five manufacturing businesses has lost intellectual property to security breaches within the past year. Kaspersky Lab press release, August 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Time, 2016","year":"2016","unstructured":"Iranian cyber attack on new york dam shows future of war . Time, 2016 . {Online; accessed 13- May - 2016 }. Iranian cyber attack on new york dam shows future of war. Time, 2016. {Online; accessed 13-May-2016}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984483"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0141-6359(92)90019-S"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592606.1592614"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1359-835X(04)00119-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-6955(99)00093-0"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0100-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)61586-8"},{"key":"e_1_3_2_1_14_1","first-page":"2015","year":"2014","unstructured":"ICS-CERT . ICS-CERT Monitor September 2014 -- February 2015 . Technical report, March 2015. ICS-CERT. ICS-CERT Monitor September 2014 -- February 2015. Technical report, March 2015.","journal-title":"ICS-CERT Monitor"},{"key":"e_1_3_2_1_15_1","volume-title":"ICS-CERT Monitor November\/December","author":"CERT.","year":"2015","unstructured":"ICS- CERT. ICS-CERT Monitor November\/December 2015 . Technical report, May 2016. ICS-CERT. ICS-CERT Monitor November\/December 2015. Technical report, May 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.3225661"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_18_1","first-page":"104","volume-title":"RSA, DSS, and other systems. In Advances in Cryptology","author":"Kocher P. C.","year":"1996","unstructured":"P. C. Kocher . Timing attacks on implementations of Diffie-Hellman , RSA, DSS, and other systems. In Advances in Cryptology , pages 104 -- 113 . Springer , 1996 . P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology, pages 104--113. Springer, 1996."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.3188750"},{"key":"e_1_3_2_1_20_1","volume-title":"Acoustic emission detection of metals and alloys during machining operations. Master's thesis","author":"Nelson J. K.","year":"2012","unstructured":"J. K. Nelson . Acoustic emission detection of metals and alloys during machining operations. Master's thesis , Purdue University , 2012 . J. K. Nelson. Acoustic emission detection of metals and alloys during machining operations. Master's thesis, Purdue University, 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium","author":"Song D. X.","year":"2001","unstructured":"D. X. Song , D. Wagner , and X. Tian . Timing analysis of keystrokes and timing attacks on SSH . In USENIX Security Symposium , 2001 . D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on SSH. In USENIX Security Symposium, 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)61382-1"},{"key":"e_1_3_2_1_23_1","volume-title":"2013 data breach investigations report. Technical report","year":"2013","unstructured":"Verizon. 2013 data breach investigations report. Technical report , 2013 . Verizon. 2013 data breach investigations report. Technical report, 2013."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"USENIX Security Symposium","author":"Vuagnoux M.","year":"2009","unstructured":"M. Vuagnoux and S. Pasini . Compromising electromagnetic emanations of wired and wireless keyboards . In USENIX Security Symposium , pages 1 -- 16 , 2009 . M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium, pages 1--16, 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1021\/nl051375r"},{"key":"e_1_3_2_1_26_1","volume-title":"Meet 'Flame,' the massive spy malware infiltrating Iranian computers. Wired","author":"Zetter K.","year":"2012","unstructured":"K. Zetter . Meet 'Flame,' the massive spy malware infiltrating Iranian computers. Wired , 2012 . K. Zetter. Meet 'Flame,' the massive spy malware infiltrating Iranian computers. Wired, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"e_1_3_2_1_28_1","first-page":"51","volume-title":"Cybersecurity for Direct Digital Manufacturing Symposium","author":"Zimmerman S.","year":"2015","unstructured":"S. Zimmerman and D. Glavach . Applying and assessing cybersecurity controls for direct digital manufacturing systems . In Cybersecurity for Direct Digital Manufacturing Symposium , pages 51 -- 64 . NIST, 2015 . S. Zimmerman and D. Glavach. Applying and assessing cybersecurity controls for direct digital manufacturing systems. In Cybersecurity for Direct Digital Manufacturing Symposium, pages 51--64. NIST, 2015."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978323","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:17Z","timestamp":1750222577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978323"}},"subtitle":["Side Channels that Reveal Factory Floor Secrets"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":28,"alternative-id":["10.1145\/2976749.2978323","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978323","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}