{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:44Z","timestamp":1772039504586,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560682","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1977-1991","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Frequency Throttling Side-Channel Attack"],"prefix":"10.1145","author":[{"given":"Chen","family":"Liu","sequence":"first","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Abhishek","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Nikhil","family":"Chawla","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Neer","family":"Roggel","sequence":"additional","affiliation":[{"name":"Intel Corporation, Rio Rancho, NM, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AMD. 2014. Ryzen_Monitor. https:\/\/github.com\/hattedsquirrel\/ryzen_monitor. (2014). Accessed: 2022-05-01.  AMD. 2014. Ryzen_Monitor. https:\/\/github.com\/hattedsquirrel\/ryzen_monitor. (2014). Accessed: 2022-05-01."},{"key":"e_1_3_2_2_2_1","unstructured":"AMD. 2018. BIOS and Kernel Developer's Guide (BKDG) for AMD Family 15h Models 70h-7Fh Processors. https:\/\/www.amd.com\/system\/files\/TechDocs\/ 55072_AMD_Family_15h_Models_70h-7Fh_BKDG.pdf. (2018). Accessed: 2022-05-01.  AMD. 2018. BIOS and Kernel Developer's Guide (BKDG) for AMD Family 15h Models 70h-7Fh Processors. https:\/\/www.amd.com\/system\/files\/TechDocs\/ 55072_AMD_Family_15h_Models_70h-7Fh_BKDG.pdf. (2018). Accessed: 2022-05-01."},{"key":"e_1_3_2_2_3_1","unstructured":"AMD. 2018. Open-Source Register Reference For AMD Family 17h Processors Models 00h-2Fh. https:\/\/developer.amd.com\/wp-content\/resources\/56255_3_03. PDF. (2018). Accessed: 2022-05-01.  AMD. 2018. Open-Source Register Reference For AMD Family 17h Processors Models 00h-2Fh. https:\/\/developer.amd.com\/wp-content\/resources\/56255_3_03. PDF. (2018). Accessed: 2022-05-01."},{"key":"e_1_3_2_2_4_1","unstructured":"AMD. 2022. AMD CVE-2020--12912. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020- 12912. (2022). Accessed: 2022-04-12.  AMD. 2022. AMD CVE-2020--12912. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020- 12912. (2022). Accessed: 2022-04-12."},{"key":"e_1_3_2_2_5_1","unstructured":"AMD. 2022. AMD Ryzen Technology: Precision Boost 2 Performance Enhancement. https:\/\/www.amd.com\/en\/support\/kb\/faq\/cpu-pb2. (2022). Accessed: 2022-03-12.  AMD. 2022. AMD Ryzen Technology: Precision Boost 2 Performance Enhancement. https:\/\/www.amd.com\/en\/support\/kb\/faq\/cpu-pb2. (2022). Accessed: 2022-03-12."},{"key":"e_1_3_2_2_6_1","unstructured":"AMD. 2022. AMD uProf User Guide. https:\/\/developer.amd.com\/wordpress\/ media\/2013\/12\/User_Guide.pdf. (2022). Accessed: 2022-4--21.  AMD. 2022. AMD uProf User Guide. https:\/\/developer.amd.com\/wordpress\/ media\/2013\/12\/User_Guide.pdf. (2022). Accessed: 2022-4--21."},{"key":"e_1_3_2_2_7_1","unstructured":"AMD. 2022. Ryzen Master 2.9 - Reference Guide. https:\/\/www.amd.com\/system\/ files\/documents\/ryzen-master-quick-reference-guide.pdf. (2022). Accessed: 2022-05-01.  AMD. 2022. Ryzen Master 2.9 - Reference Guide. https:\/\/www.amd.com\/system\/ files\/documents\/ryzen-master-quick-reference-guide.pdf. (2022). Accessed: 2022-05-01."},{"key":"e_1_3_2_2_8_1","unstructured":"ARM. 2022. ARMv8-A Power Management. https:\/\/developer.arm.com\/ documentation\/100960\/0100\/ARMv8-A-Power-management?lang=en. (2022). Accessed: 2022-04--10.  ARM. 2022. ARMv8-A Power Management. https:\/\/developer.arm.com\/ documentation\/100960\/0100\/ARMv8-A-Power-management?lang=en. (2022). Accessed: 2022-04--10."},{"key":"e_1_3_2_2_9_1","volume-title":"Feedback Systems","author":"\u00c5str\u00f6m Karl Johan","unstructured":"Karl Johan \u00c5str\u00f6m and Richard M Murray . 2010. Feedback systems . In Feedback Systems . Princeton university press . Karl Johan \u00c5str\u00f6m and Richard M Murray. 2010. Feedback systems. In Feedback Systems. Princeton university press."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322234"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 22nd Annual International Conference on Supercomputing (ICS '08)","author":"Lloyd Bircher W.","unstructured":"W. Lloyd Bircher and Lizy K. John . 2008. Analysis of Dynamic Power Management on Multi-Core Processors . In Proceedings of the 22nd Annual International Conference on Supercomputing (ICS '08) . New York, NY, USA, 327--338. https:\/\/doi.org\/10.1145\/1375527.1375575 10.1145\/1375527.1375575 W. Lloyd Bircher and Lizy K. John. 2008. Analysis of Dynamic Power Management on Multi-Core Processors. In Proceedings of the 22nd Annual International Conference on Supercomputing (ICS '08). New York, NY, USA, 327--338. https:\/\/doi.org\/10.1145\/1375527.1375575"},{"key":"e_1_3_2_2_12_1","volume-title":"WattsKit: Software-Defined Power Monitoring of Distributed Systems. 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (2017","author":"Colmant Maxime","year":"2017","unstructured":"Maxime Colmant , Pascal Felber , Romain Rouvoy , and Lionel Seinturier . 2017 . WattsKit: Software-Defined Power Monitoring of Distributed Systems. 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (2017 ), 514--523. https:\/\/doi.org\/10.1109\/CCGRID.2017.27 10.1109\/CCGRID.2017.27 Maxime Colmant, Pascal Felber, Romain Rouvoy, and Lionel Seinturier. 2017. WattsKit: Software-Defined Power Monitoring of Distributed Systems. 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (2017), 514--523. https:\/\/doi.org\/10.1109\/CCGRID.2017.27"},{"key":"e_1_3_2_2_13_1","unstructured":"Compaq Computer Corporation and Revision B. 2000. Advanced Configuration and Power Interface Specification. (2000). http:\/\/www.acpi.info\/  Compaq Computer Corporation and Revision B. 2000. Advanced Configuration and Power Interface Specification. (2000). http:\/\/www.acpi.info\/"},{"key":"e_1_3_2_2_14_1","volume-title":"Paper 2016\/086.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. Cryptology ePrint Archive , Paper 2016\/086. ( 2016 ). https:\/\/eprint.iacr.org\/2016\/086 Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. Cryptology ePrint Archive, Paper 2016\/086. (2016). https:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_2_2_15_1","first-page":"00","volume-title":"SmartWatts: Self- Calibrating Software-Defined Power Meter for Containers. 2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) (2020","author":"Fieni Guillaume","year":"2020","unstructured":"Guillaume Fieni , Romain Rouvoy , and Lionel Seinturier . 2020 . SmartWatts: Self- Calibrating Software-Defined Power Meter for Containers. 2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) (2020 ), 479--488. https:\/\/doi.org\/10.1109\/CCGrid49817.2020. 00 - 45 10.1109\/CCGrid49817.2020.00-45 Guillaume Fieni, Romain Rouvoy, and Lionel Seinturier. 2020. SmartWatts: Self- Calibrating Software-Defined Power Meter for Containers. 2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) (2020), 479--488. https:\/\/doi.org\/10.1109\/CCGrid49817.2020.00-45"},{"key":"e_1_3_2_2_16_1","volume-title":"Information-Leakage Analysis based on Hardware Performance Counters. Master's thesis","author":"Fusi Matteo Maria","unstructured":"Matteo Maria Fusi . 2016. Information-Leakage Analysis based on Hardware Performance Counters. Master's thesis . The Polytechnic University of Milan . Matteo Maria Fusi. 2016. Information-Leakage Analysis based on Hardware Performance Counters. Master's thesis. The Polytechnic University of Milan."},{"key":"e_1_3_2_2_17_1","unstructured":"Benjamin Jun Gilbert Goodwill Josh Jaffe Pankaj Rohatgi etal 2011. A testing methodology for side-channel resistance validation. In NIST non-invasive attack testing workshop Vol. 7.  Benjamin Jun Gilbert Goodwill Josh Jaffe Pankaj Rohatgi et al. 2011. A testing methodology for side-channel resistance validation. In NIST non-invasive attack testing workshop Vol. 7."},{"key":"e_1_3_2_2_18_1","volume-title":"P.: A testing methodology for side-channel resistance validation, NIAT.","author":"Goodwill Gilbert","year":"2011","unstructured":"Gilbert Goodwill , Benjamin Jun , Josh Jaffe , and Pankaj Rohatgi . 2011 . P.: A testing methodology for side-channel resistance validation, NIAT. (2011). Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. P.: A testing methodology for side-channel resistance validation, NIAT. (2011)."},{"key":"e_1_3_2_2_19_1","volume-title":"CPU power management","author":"Gough Corey","unstructured":"Corey Gough , Ian Steiner , and Winston Saunders . 2015. CPU power management . Apress , Berkeley, CA , 21--70. https:\/\/doi.org\/10.1007\/978-1-4302-6638-9_2 10.1007\/978-1-4302-6638-9_2 Corey Gough, Ian Steiner, and Winston Saunders. 2015. CPU power management. Apress, Berkeley, CA, 21--70. https:\/\/doi.org\/10.1007\/978-1-4302-6638-9_2"},{"key":"e_1_3_2_2_20_1","unstructured":"Shay Gueron. 2010. Intel\u00aeAdvanced Encryption Standard (AES) NewInstructions Set. (2010). https:\/\/www.intel.com\/content\/dam\/doc\/white-paper\/advancedencryption-standard-new-instructions-set-paper.pdf  Shay Gueron. 2010. Intel\u00aeAdvanced Encryption Standard (AES) NewInstructions Set. (2010). https:\/\/www.intel.com\/content\/dam\/doc\/white-paper\/advancedencryption-standard-new-instructions-set-paper.pdf"},{"key":"#cr-split#-e_1_3_2_2_21_1.1","doi-asserted-by":"crossref","unstructured":"Jawad Haj-Yahya Avi Mendelson Yosi Ben-asher and Anupam Chattopadhyay. 2018. Energy Efficient High Performance Processors Recent Approaches for Designing Green High Performance Computing. https:\/\/doi.org\/10.1007\/978-981-10-8554-3 10.1007\/978-981-10-8554-3","DOI":"10.1007\/978-981-10-8554-3"},{"key":"#cr-split#-e_1_3_2_2_21_1.2","doi-asserted-by":"crossref","unstructured":"Jawad Haj-Yahya Avi Mendelson Yosi Ben-asher and Anupam Chattopadhyay. 2018. Energy Efficient High Performance Processors Recent Approaches for Designing Green High Performance Computing. https:\/\/doi.org\/10.1007\/978-981-10-8554-3","DOI":"10.1007\/978-981-10-8554-3"},{"key":"e_1_3_2_2_22_1","volume-title":"2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE Computer Society","author":"Haj-Yahya J.","year":"2012","unstructured":"J. Haj-Yahya , L. Orosa , J. S. Kim , J. Gomez Luna , A. Yaglikci , M. Alser , I. Puddu , and O. Mutlu . 2021. IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors . In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE Computer Society , Los Alamitos, CA, USA, 985--998. https:\/\/doi.org\/10.1109\/ISCA5 2012 .2021.00081 10.1109\/ISCA52012.2021.00081 J. Haj-Yahya, L. Orosa, J. S. Kim, J. Gomez Luna, A. Yaglikci, M. Alser, I. Puddu, and O. Mutlu. 2021. IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE Computer Society, Los Alamitos, CA, USA, 985--998. https:\/\/doi.org\/10.1109\/ISCA52012.2021.00081"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"e_1_3_2_2_24_1","unstructured":"Intel. 2022. Guidelines for Mitigating Timing Side Channels Against Cryptographic Implementations. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/securecoding\/ mitigate-timing-side-channel-crypto-implementation.html. (2022). Accessed: 2022-05-02.  Intel. 2022. Guidelines for Mitigating Timing Side Channels Against Cryptographic Implementations. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/securecoding\/ mitigate-timing-side-channel-crypto-implementation.html. (2022). Accessed: 2022-05-02."},{"key":"e_1_3_2_2_25_1","unstructured":"Intel. 2022. Intel CVE-2020-8694. https:\/\/www.intel.com\/content\/www\/us\/en\/ security-center\/advisory\/intel-sa-00389.html. (2022). Accessed: 2022-04-12.  Intel. 2022. Intel CVE-2020-8694. https:\/\/www.intel.com\/content\/www\/us\/en\/ security-center\/advisory\/intel-sa-00389.html. (2022). Accessed: 2022-04-12."},{"key":"e_1_3_2_2_26_1","unstructured":"Intel. 2022. Intel Running Average Power Limit Energy Reporting. https: \/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/softwaresecurity-guidance\/advisory-guidance\/running-average-power-limit-energyreporting. html. (2022). Accessed: 2022-04-12.  Intel. 2022. Intel Running Average Power Limit Energy Reporting. https: \/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/softwaresecurity-guidance\/advisory-guidance\/running-average-power-limit-energyreporting. html. (2022). Accessed: 2022-04-12."},{"key":"e_1_3_2_2_27_1","unstructured":"Intel. 2022. Intel SGX. https:\/\/software.intel.com\/en-us\/sgx. (2022). Accessed: 2022-05-02.  Intel. 2022. Intel SGX. https:\/\/software.intel.com\/en-us\/sgx. (2022). Accessed: 2022-05-02."},{"key":"e_1_3_2_2_28_1","unstructured":"Intel. 2022. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals. https: \/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-sdm.html. (2022). Accessed: 2022-05-02.  Intel. 2022. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals. https: \/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-sdm.html. (2022). Accessed: 2022-05-02."},{"key":"e_1_3_2_2_29_1","unstructured":"Intel. 2022. Intel\u00ae Integrated Performance Primitives Cryptography. https: \/\/github.com\/intel\/ipp-crypto. (2022). Accessed: 2022-04-07.  Intel. 2022. Intel\u00ae Integrated Performance Primitives Cryptography. https: \/\/github.com\/intel\/ipp-crypto. (2022). Accessed: 2022-04-07."},{"key":"e_1_3_2_2_30_1","unstructured":"Intel. 2022. Overview of Enhanced Intel SpeedStep\u00ae Technology for Intel\u00ae Processors. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000007073\/ processors.html. (2022). Accessed: 2022-04-07.  Intel. 2022. Overview of Enhanced Intel SpeedStep\u00ae Technology for Intel\u00ae Processors. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000007073\/ processors.html. (2022). Accessed: 2022-04-07."},{"key":"e_1_3_2_2_31_1","unstructured":"Intel. 2022. Overview of Intel\u00ae Speed Shift Technology. https: \/\/edc.intel.com\/content\/www\/us\/en\/design\/ipla\/software-developmentplatforms\/client\/platforms\/alder-lake-desktop\/12th-generation-intel-coreprocessors- datasheet-volume-1-of-2\/002\/intel-speed-shift-technology\/. (2022). Accessed: 2022-04-07.  Intel. 2022. Overview of Intel\u00ae Speed Shift Technology. https: \/\/edc.intel.com\/content\/www\/us\/en\/design\/ipla\/software-developmentplatforms\/client\/platforms\/alder-lake-desktop\/12th-generation-intel-coreprocessors- datasheet-volume-1-of-2\/002\/intel-speed-shift-technology\/. (2022). Accessed: 2022-04-07."},{"key":"e_1_3_2_2_32_1","unstructured":"irusanov. 2021. ZenStates-Core. https:\/\/github.com\/irusanov\/ZenStates-Core. (2021). Accessed: 2022-07-25.  irusanov. 2021. ZenStates-Core. https:\/\/github.com\/irusanov\/ZenStates-Core. (2021). Accessed: 2022-07-25."},{"key":"e_1_3_2_2_33_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. (2016). https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_ Encryption_Whitepaper_v7-Public.pdf Accessed: 2022-09-06.  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD memory encryption. (2016). https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_ Encryption_Whitepaper_v7-Public.pdf Accessed: 2022-09-06."},{"key":"e_1_3_2_2_34_1","volume-title":"2008 IEEE 14th International Symposium on High Performance Computer Architecture. 123--134","author":"Kim Wonyoung","year":"2008","unstructured":"Wonyoung Kim , Meeta S Gupta , Gu-Yeon Wei , and David Brooks . 2008 . System level analysis of fast, per-core DVFS using on-chip switching regulators . In 2008 IEEE 14th International Symposium on High Performance Computer Architecture. 123--134 . https:\/\/doi.org\/10.1109\/HPCA.2008.4658633 10.1109\/HPCA.2008.4658633 Wonyoung Kim, Meeta S Gupta, Gu-Yeon Wei, and David Brooks. 2008. System level analysis of fast, per-core DVFS using on-chip switching regulators. In 2008 IEEE 14th International Symposium on High Performance Computer Architecture. 123--134. https:\/\/doi.org\/10.1109\/HPCA.2008.4658633"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_2_36_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kogler Andreas","year":"2022","unstructured":"Andreas Kogler , Daniel Gruss , and Michael Schwarz . 2022 . Minefield: A Softwareonly Protection for SGX Enclaves against DVFS Attacks . In 31st USENIX Security Symposium (USENIX Security 22) . Boston, MA, 4147--4164. Andreas Kogler, Daniel Gruss, and Michael Schwarz. 2022. Minefield: A Softwareonly Protection for SGX Enclaves against DVFS Attacks. In 31st USENIX Security Symposium (USENIX Security 22). Boston, MA, 4147--4164."},{"key":"e_1_3_2_2_37_1","unstructured":"leogx9r. 2022. Ryzen SMU. https:\/\/gitlab.com\/leogx9r\/ryzen_smu. (2022).  leogx9r. 2022. Ryzen SMU. https:\/\/gitlab.com\/leogx9r\/ryzen_smu. (2022)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702271"},{"key":"e_1_3_2_2_40_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . 2008. Power analysis attacks: Revealing the secrets of smart cards . Vol. 31 . Springer Science & Business Media . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media."},{"key":"e_1_3_2_2_41_1","volume-title":"The Case of Software-Based Energy Side Channels. In European Symposium on Research in Computer Security (ESORICS","author":"Mantel Heiko","year":"2018","unstructured":"Heiko Mantel , Johannes Schickel , Alexandra Weber , and Friedrich Weber . 2018 . How Secure Is Green IT? The Case of Software-Based Energy Side Channels. In European Symposium on Research in Computer Security (ESORICS 2018). 218--239. Heiko Mantel, Johannes Schickel, Alexandra Weber, and Friedrich Weber. 2018. How Secure Is Green IT? The Case of Software-Based Energy Side Channels. In European Symposium on Research in Computer Security (ESORICS 2018). 218--239."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2013.03.03"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00063"},{"key":"e_1_3_2_2_44_1","volume-title":"Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. Comput. Surveys (Jan","author":"Muralidhar Rajeev","year":"2022","unstructured":"Rajeev Muralidhar , Renata Borovica-Gajic , and Rajkumar Buyya . 2022. Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. Comput. Surveys (Jan . 2022 ). https:\/\/doi.org\/10.1145\/3511094 10.1145\/3511094 Rajeev Muralidhar, Renata Borovica-Gajic, and Rajkumar Buyya. 2022. Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. Comput. Surveys (Jan. 2022). https:\/\/doi.org\/10.1145\/3511094"},{"key":"e_1_3_2_2_45_1","first-page":"3","article-title":"Monitoring Energy Hotspots in Software","volume":"22","author":"Noureddine Adel","year":"2015","unstructured":"Adel Noureddine , Romain Rouvoy , and Lionel Seinturier . 2015 . Monitoring Energy Hotspots in Software . Automated Software Engg. 22 , 3 (sep 2015), 291--332. https:\/\/doi.org\/10.1007\/s10515-014-0171-1 10.1007\/s10515-014-0171-1 Adel Noureddine, Romain Rouvoy, and Lionel Seinturier. 2015. Monitoring Energy Hotspots in Software. Automated Software Engg. 22, 3 (sep 2015), 291--332. https:\/\/doi.org\/10.1007\/s10515-014-0171-1","journal-title":"Automated Software Engg."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_2_48_1","volume-title":"On the Exact Success Rate of Side Channel Analysis in the Gaussian Model","author":"Rivain Matthieu","unstructured":"Matthieu Rivain . 2009. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model . Springer Berlin Heidelberg , Berlin, Heidelberg , 165--183. Matthieu Rivain. 2009. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. Springer Berlin Heidelberg, Berlin, Heidelberg, 165--183."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2012.12"},{"key":"e_1_3_2_2_50_1","volume-title":"Paper 2016\/700.","author":"Saab Sami","year":"2016","unstructured":"Sami Saab , Pankaj Rohatgi , and Craig Hampel . 2016. Side-Channel Protections for Cryptographic Instruction Set Extensions. Cryptology ePrint Archive , Paper 2016\/700. ( 2016 ). https:\/\/eprint.iacr.org\/2016\/700 https:\/\/eprint.iacr.org\/2016\/700. Sami Saab, Pankaj Rohatgi, and Craig Hampel. 2016. Side-Channel Protections for Cryptographic Instruction Set Extensions. Cryptology ePrint Archive, Paper 2016\/700. (2016). https:\/\/eprint.iacr.org\/2016\/700 https:\/\/eprint.iacr.org\/2016\/700."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cluster48925.2021.00087"},{"key":"e_1_3_2_2_53_1","volume-title":"Paper 2017\/138.","author":"Standaert Fran\u00e7ois-Xavier","year":"2017","unstructured":"Fran\u00e7ois-Xavier Standaert . 2017. How (not) to UseWelch's T-test in Side-Channel Security Evaluations. Cryptology ePrint Archive , Paper 2017\/138. ( 2017 ). https: \/\/eprint.iacr.org\/2017\/138 Fran\u00e7ois-Xavier Standaert. 2017. How (not) to UseWelch's T-test in Side-Channel Security Evaluations. Cryptology ePrint Archive, Paper 2017\/138. (2017). https: \/\/eprint.iacr.org\/2017\/138"},{"key":"e_1_3_2_2_54_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang , Riccardo Paccagnella , Elizabeth Tang He , Hovav Shacham , Christopher W. Fletcher , and David Kohlbrenner . 2022 . Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 . In 31st USENIX Security Symposium (USENIX Security 22) . USENIX Association, Boston, MA, 679--697. Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, and David Kohlbrenner. 2022. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 679--697."},{"key":"e_1_3_2_2_55_1","unstructured":"Wikichip. 2021. Precision Boost Overdrive (PBO) - AMD. https:\/\/en.wikichip. org\/wiki\/amd\/pbo. (2021). Accessed: 2022-07-25.  Wikichip. 2021. Precision Boost Overdrive (PBO) - AMD. https:\/\/en.wikichip. org\/wiki\/amd\/pbo. (2021). Accessed: 2022-07-25."},{"key":"e_1_3_2_2_56_1","volume-title":"Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Wu Lichao","year":"2020","unstructured":"Lichao Wu and Stjepan Picek . 2020. Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2020 ), 389--415. Lichao Wu and Stjepan Picek. 2020. Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 389--415."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875934"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":57,"alternative-id":["10.1145\/3548606.3560682","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560682","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}