{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:40Z","timestamp":1773511180981,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1812407, CNS-2029520, IIS-1956002"],"award-info":[{"award-number":["CNS-1812407, CNS-2029520, IIS-1956002"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507757","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"285-299","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Eavesdropping user credentials via GPU side channels on smartphones"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5517-5882","authenticated-orcid":false,"given":"Boyuan","family":"Yang","sequence":"first","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-0379","authenticated-orcid":false,"given":"Ruirong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"given":"Kai","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8372-6541","authenticated-orcid":false,"given":"Jun","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2144-6960","authenticated-orcid":false,"given":"Wei","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_2_1","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. USENIX Summit on Hot Topics in Security (HotSec)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"e_1_3_2_1_5_1","unstructured":"Anupam Das Nikita Borisov and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.. In NDSS."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"e_1_3_2_1_7_1","volume-title":"Romit Roy Choudhury, and Srihari Nelakuditi","author":"Dey Sanorita","year":"2014","unstructured":"Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2015.7273537"},{"key":"e_1_3_2_1_9_1","unstructured":"Facebook. 2019. Facebook advisory for CVE-2019-3568. https:\/\/www.facebook.com\/security\/advisories\/cve-2019-3568"},{"key":"e_1_3_2_1_10_1","unstructured":"Freedesktop.org. 2021. The Mesa 3D Graphics Library. https:\/\/mesa3d.org\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00022"},{"key":"e_1_3_2_1_12_1","unstructured":"Dan Ginsburg. 2007. AMD_performance_monitor. https:\/\/www.khronos.org\/registry\/OpenGL\/extensions\/AMD\/AMD_performance_monitor.txt"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339809"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053036"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329804"},{"key":"e_1_3_2_1_16_1","volume-title":"Project Zero: Attacking the Qualcomm Adreno GPU. https:\/\/googleprojectzero.blogspot.com\/2020\/09\/attacking-qualcomm-adreno-gpu.html","author":"Hawkes Ben","year":"2020","unstructured":"Ben Hawkes and Project Zero. 2020. Project Zero: Attacking the Qualcomm Adreno GPU. https:\/\/googleprojectzero.blogspot.com\/2020\/09\/attacking-qualcomm-adreno-gpu.html"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821665"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Inc.. 2020. Security-Enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux"},{"key":"e_1_3_2_1_19_1","unstructured":"Google Inc.. 2021. Google Android fts_driver_test_write Heap-based Buffer Overflow Privilege Escalation Vulnerability. https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-21-279\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Google Inc.. 2021. include\/uapi\/linux\/msm_kgsl.h - kernel\/msm - Git at Google. https:\/\/android.googlesource.com\/kernel\/msm\/+\/android-7.1.0_r0.2\/include\/uapi\/linux\/msm_kgsl.h"},{"key":"e_1_3_2_1_21_1","unstructured":"Google Inc.. 2021. Play Protect | Google Developers. https:\/\/developers.google.com\/android\/play-protect"},{"key":"e_1_3_2_1_22_1","unstructured":"Google Inc.. 2021. Privilege escalation in Google Android. https:\/\/source.android.com\/security\/bulletin\/pixel\/2021-01-01"},{"key":"e_1_3_2_1_23_1","unstructured":"Google Inc.. 2021. Reduce overdraw. https:\/\/developer.android.com\/topic\/performance\/rendering\/overdraw"},{"key":"e_1_3_2_1_24_1","unstructured":"Qualcomm Technologies Inc.. 2021. Qualcomm Adreno GPU Overview. https:\/\/developer.qualcomm.com\/docs\/adreno-gpu\/developer-guide\/gpu\/overview.html"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00922ED1V01Y201905CAC047"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01770-0"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00020"},{"key":"e_1_3_2_1_28_1","unstructured":"Jari Komppa. 2009. QCOM_performance_monitor_global_mode. https:\/\/www.khronos.org\/registry\/OpenGL\/extensions\/QCOM\/QCOM_performance_monitor_global_mode.txt"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2010.5669738"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916)","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916). 549\u2013564."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341729"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"e_1_3_2_1_34_1","volume-title":"24th USENIX Security Symposium. 785\u2013800","author":"Michalevsky Yan","year":"2015","unstructured":"Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. Powerspy: Location tracking using mobile device power analysis. In 24th USENIX Security Symposium. 785\u2013800."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_36_1","unstructured":"Elizabeth Montalbano. 2020. Facebook Messenger Bug Allows Spying on Android Users. https:\/\/threatpost.com\/facebook-messenger-bug-spying-android\/161435\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766522"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_40_1","volume-title":"The 15th Symposium on Usable Privacy and Security. 319\u2013338","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2019. Why people (don\u2019t) use password managers effectively. In The 15th Symposium on Usable Privacy and Security. 319\u2013338."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.22667\/JOWUA.2015.09.31.003"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969626"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763394"},{"key":"e_1_3_2_1_44_1","unstructured":"Martin Peres Samuel Pitoiset. 2014. Expose NVIDIA\u2019s performance counters to the userspace for NV50\/Tesla. https:\/\/www.x.org\/wiki\/Events\/XDC2014\/XDC2014PitoisetNouveau\/talk-perf.pdf"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.163"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2011.6163104"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196510"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212506"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29938-9_1"},{"key":"e_1_3_2_1_52_1","unstructured":"Jeff Vander Stoep. 2015. ioctl command whitelisting in SELinux. http:\/\/kernsec.org\/files\/lss2015\/vanderstoep.pdf"},{"key":"e_1_3_2_1_53_1","volume-title":"Edward JM Colbert, and Paul Yu","author":"Wang Daimeng","year":"2019","unstructured":"Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B Abu-Ghazaleh, Srikanth V Krishnamurthy, Edward JM Colbert, and Paul Yu. 2019. Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. In NDSS."},{"key":"e_1_3_2_1_54_1","unstructured":"Davey Winder. 2020. Qualcomm Snapdragon Bugs Leave 40% Of World\u2019s Smartphones Exposed To Spying Threat. https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/08\/06\/hundreds-of-millions-of-android-phones-can-spy-on-users-as-400-snapdragon-security-flaws-confirmed-qualcomm-google-lg-samsung-oneplus\/"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919635"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507757","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:40Z","timestamp":1750191100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":57,"alternative-id":["10.1145\/3503222.3507757","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507757","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}