{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:41Z","timestamp":1750220861765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Semiconductor Research Corporation and TxACE","award":["2810.002"],"award-info":[{"award-number":["2810.002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,10]]},"DOI":"10.1145\/3370748.3406549","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T16:10:32Z","timestamp":1596816632000},"page":"223-228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["BiasP"],"prefix":"10.1145","author":[{"given":"Harshit","family":"Kumar","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Nikhil","family":"Chawla","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Saibal","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,8,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Application ID. Retrieved November 21 2019 from https:\/\/developer.android.com\/studio\/build\/application-id  [n.d.]. Application ID. Retrieved November 21 2019 from https:\/\/developer.android.com\/studio\/build\/application-id"},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Building Kernels. Retrieved November 21 2019 from https:\/\/source.android.com\/setup\/build\/building-kernels  [n.d.]. Building Kernels. Retrieved November 21 2019 from https:\/\/source.android.com\/setup\/build\/building-kernels"},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. CFS Scheduler. Retrieved November 21 2019 from https:\/\/www.kernel.org\/doc\/Documentation\/scheduler\/sched-design-CFS.txt  [n.d.]. CFS Scheduler. Retrieved November 21 2019 from https:\/\/www.kernel.org\/doc\/Documentation\/scheduler\/sched-design-CFS.txt"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_2_4_1"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","unstructured":"[n.d.]. Linux Programmer's Manual PROC. Retrieved November 21 2019 from http:\/\/man7.org\/linux\/man-pages\/man5\/proc.5.html  [n.d.]. Linux Programmer's Manual PROC. Retrieved November 21 2019 from http:\/\/man7.org\/linux\/man-pages\/man5\/proc.5.html"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_2_7_1"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","unstructured":"[n.d.]. Scheduler Extensions. Retrieved November 21 2019 from https:\/\/android.googlesource.com\/kernel\/msm\/+\/android-msm-marlin-3.18-nougat-dr1\/Documentation\/scheduler\/sched-zone.txt  [n.d.]. Scheduler Extensions. Retrieved November 21 2019 from https:\/\/android.googlesource.com\/kernel\/msm\/+\/android-msm-marlin-3.18-nougat-dr1\/Documentation\/scheduler\/sched-zone.txt"},{"key":"e_1_3_2_2_10_1","unstructured":"[n.d.]. Simpleperf. Retrieved November 21 2019 from https:\/\/developer.android.com\/ndk\/guides\/simpleperf  [n.d.]. Simpleperf. Retrieved November 21 2019 from https:\/\/developer.android.com\/ndk\/guides\/simpleperf"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","unstructured":"Ionut Arghire. 2019. Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion. https:\/\/www.securityweek.com\/linux-crypto-miner-uses-kernel-mode-rootkits-evasion  Ionut Arghire. 2019. Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion. https:\/\/www.securityweek.com\/linux-crypto-miner-uses-kernel-mode-rootkits-evasion"},{"key":"e_1_3_2_2_13_1","unstructured":"Yogesh Babar. 2012. Understanding Linux Process States. https:\/\/access.redhat.com\/sites\/default\/files\/attachments\/processstates_20120831.pdf  Yogesh Babar. 2012. Understanding Linux Process States. https:\/\/access.redhat.com\/sites\/default\/files\/attachments\/processstates_20120831.pdf"},{"key":"e_1_3_2_2_14_1","unstructured":"Jonathan Corbet. 2013. Per-entity load tracking. https:\/\/lwn.net\/Articles\/531853\/  Jonathan Corbet. 2013. Per-entity load tracking. https:\/\/lwn.net\/Articles\/531853\/"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354227"},{"volume-title":"Proceedings of the 35th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 35)","author":"Dirk","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.16"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763052"},{"key":"e_1_3_2_2_19_1","first-page":"1","article-title":"Hyper-Threading Technology Architecture and Microarchitecture","volume":"6","author":"Marr Deborah T.","year":"2002","journal-title":"Intel Technology Journal"},{"key":"e_1_3_2_2_20_1","unstructured":"Vikram Mulukutla. 2016. sched: Introduce Window Assisted Load Tracking. https:\/\/lwn.net\/Articles\/704903\/  Vikram Mulukutla. 2016. sched: Introduce Window Assisted Load Tracking. https:\/\/lwn.net\/Articles\/704903\/"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the Linux Symposium","volume":"2","author":"Pallipadi Venkatesh","year":"2006"},{"key":"e_1_3_2_2_22_1","unstructured":"Steven Rostedt. 2008. ftrace - Function Tracer. https:\/\/www.kernel.org\/doc\/Documentation\/trace\/ftrace.txt  Steven Rostedt. 2008. ftrace - Function Tracer. https:\/\/www.kernel.org\/doc\/Documentation\/trace\/ftrace.txt"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"volume-title":"CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Adrian","key":"e_1_3_2_2_24_1"},{"volume-title":"Proceedings of the 1st USENIX Conference on Operating Systems Design and Implementation (OSDI '94)","author":"Mark","key":"e_1_3_2_2_25_1"}],"event":{"name":"ISLPED '20: ACM\/IEEE International Symposium on Low Power Electronics and Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS"],"location":"Boston Massachusetts","acronym":"ISLPED '20"},"container-title":["Proceedings of the ACM\/IEEE International Symposium on Low Power Electronics and Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3370748.3406549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3370748.3406549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:35Z","timestamp":1750202615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3370748.3406549"}},"subtitle":["a DVFS based exploit to undermine resource allocation fairness in linux platforms"],"short-title":[],"issued":{"date-parts":[[2020,8,10]]},"references-count":25,"alternative-id":["10.1145\/3370748.3406549","10.1145\/3370748"],"URL":"https:\/\/doi.org\/10.1145\/3370748.3406549","relation":{},"subject":[],"published":{"date-parts":[[2020,8,10]]},"assertion":[{"value":"2020-08-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}