{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:44:47Z","timestamp":1751388287179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,22]]},"DOI":"10.1145\/3572864.3580339","type":"proceedings-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:18:37Z","timestamp":1676333917000},"page":"81-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["ThermWare"],"prefix":"10.1145","author":[{"given":"Nakul","family":"Garg","sequence":"first","affiliation":[{"name":"University of Maryland College Park"}]},{"given":"Irtaza","family":"Shahid","sequence":"additional","affiliation":[{"name":"University of Maryland College Park"}]},{"given":"Erin","family":"Avllazagaj","sequence":"additional","affiliation":[{"name":"University of Maryland College Park"}]},{"given":"Jennie","family":"Hill","sequence":"additional","affiliation":[{"name":"University of Maryland College Park"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Nirupam","family":"Roy","sequence":"additional","affiliation":[{"name":"University of Maryland College Park"}]}],"member":"320","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/beagleboard.org\/black. Last accessed","author":"Beaglebone","year":"2022","unstructured":"Beaglebone black. https:\/\/beagleboard.org\/black. Last accessed 21 December 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"affordable, high-performance thermal imaging for your smartphone. https:\/\/www.thermal.com\/uploads\/1\/0\/1\/3\/101388544\/compactpro-sellsheet-usav1.pdf. Last accessed","author":"Compactpro","year":"2022","unstructured":"Compactpro: affordable, high-performance thermal imaging for your smartphone. https:\/\/www.thermal.com\/uploads\/1\/0\/1\/3\/101388544\/compactpro-sellsheet-usav1.pdf. Last accessed 21 December 2022."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.flirmedia.com\/MMC\/THG\/Brochures\/RND_010\/RND_010_US.pdf. Last accessed","author":"Flir","year":"2022","unstructured":"Flir a325sc thermal imaging camera for real-time analysis. https:\/\/www.flirmedia.com\/MMC\/THG\/Brochures\/RND_010\/RND_010_US.pdf. Last accessed 21 December 2022."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"e_1_3_2_1_5_1","volume-title":"Q3 2016 Report. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/q3-2016-state-of-the-internet-security-report.pdf","author":"Akamai","year":"2016","unstructured":"Akamai. Akamai's State of the Internet \/ Security, Q3 2016 Report. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/q3-2016-state-of-the-internet-security-report.pdf, 2016."},{"key":"e_1_3_2_1_6_1","first-page":"3487","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Avllazagaj E.","year":"2021","unstructured":"Avllazagaj, E., Zhu, Z., Bilge, L., Balzarotti, D., and Dumitras, T. When malware changed its mind: An empirical study of variable program behaviors in the real world. In 30th USENIX Security Symposium (USENIX Security 21) (Aug. 2021), USENIX Association, pp. 3487--3504."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3539775"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538765"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139946"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42003-021-02124-y"},{"key":"e_1_3_2_1_11_1","volume-title":"Detecting firmware modification on solid state drives via current draw analysis. Computers & Security","author":"Brown D.","year":"2020","unstructured":"Brown, D., Walker III, T. O., Blanco, J. A., Ives, R. W., Ngo, H. T., Shey, J., and Rakvic, R. Detecting firmware modification on solid state drives via current draw analysis. Computers & Security (2020), 102149."},{"key":"e_1_3_2_1_12_1","volume-title":"Apr. 21","author":"Choudhury R. R.","year":"2020","unstructured":"Choudhury, R. R., and Roy, N. Vibrational devices as sound sensors, Apr. 21 2020. US Patent 10,628,484."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"e_1_3_2_1_14_1","volume-title":"Presented as part of the 2013 {USENIX} Workshop on Health Information Technologies","author":"Clark S. S.","year":"2013","unstructured":"Clark, S. S., Ransford, B., Rahmati, A., Guineau, S., Sorber, J., Xu, W., and Fu, K. Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In Presented as part of the 2013 {USENIX} Workshop on Health Information Technologies (2013)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_2_1_16_1","first-page":"33","volume-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (New York, NY, USA, 2020), ASIA CCS '20, Association for Computing Machinery","author":"Ding F.","unstructured":"Ding, F., Li, H., Luo, F., Hu, H., Cheng, L., Xiao, H., and Ge, R. Deeppower: Non-intrusive and deep learning-based detection of iot malware using power side channels. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (New York, NY, USA, 2020), ASIA CCS '20, Association for Computing Machinery, p. 33--46."},{"key":"e_1_3_2_1_17_1","volume-title":"Dyn analysis summary of Friday October 21 attack. https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/","author":"Dyn","year":"2016","unstructured":"Dyn. Dyn analysis summary of Friday October 21 attack. https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691167"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376897.3377866"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2016.7753336"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229572"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITHERM.2006.1645331"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218514"},{"key":"e_1_3_2_1_28_1","first-page":"1271","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Hu K.","year":"2013","unstructured":"Hu, K., Nowroz, A. N., Reda, S., and Koushanfar, F. High-sensitivity hardware trojan detection using multimodal characterization. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE) (2013), IEEE, pp. 1271--1276."},{"key":"e_1_3_2_1_29_1","first-page":"219","volume-title":"International Conference on Smart Card Research and Advanced Applications","author":"Hutter M.","year":"2013","unstructured":"Hutter, M., and Schmidt, J.-M. The temperature side channel and heating fault attacks. In International Conference on Smart Card Research and Advanced Applications (2013), Springer, pp. 219--235."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_31_1","volume-title":"Malware detection on general-purpose computers using power consumption monitoring: A proof of concept and case study. arXiv preprint arXiv:1705.01977","author":"Jim\u00e9nez J. M. H.","year":"2017","unstructured":"Jim\u00e9nez, J. M. H., Nichols, J. A., Goseva-Popstojanova, K., Prowell, S., and Bridges, R. A. Malware detection on general-purpose computers using power consumption monitoring: A proof of concept and case study. arXiv preprint arXiv:1705.01977 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/STHERM.2012.6188871"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_2_1_34_1","volume-title":"Aug","author":"Kinger P.","year":"2021","unstructured":"Kinger, P., and Logan, M. Linux threat report 2021 1h: Linux threats in the cloud and security recommendations, Aug 2021."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483263"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_2_1_37_1","first-page":"865","volume-title":"24th USENIX security symposium (USENIX security 15)","author":"Masti R. J.","year":"2015","unstructured":"Masti, R. J., Rai, D., Ranganathan, A., M\u00fcller, C., Thiele, L., and Capkun, S. Thermal covert channels on multi-core platforms. In 24th USENIX security symposium (USENIX security 15) (2015), pp. 865--880."},{"key":"e_1_3_2_1_38_1","unstructured":"Meidan Y. Bohadana M. Shabtai A. Ochoa M. Tippenhauer N. O. Guarnizo J. D. and Elovici Y. Detection of unauthorized IoT devices using machine learning techniques. https:\/\/arxiv.org\/pdf\/1709.04647.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536423"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the CARO Workshop","author":"Morgenstern M.","year":"2010","unstructured":"Morgenstern, M., and Pilz, H. Useful and useless statistics about viruses and anti-virus programs. In Proceedings of the CARO Workshop (2010)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"e_1_3_2_1_43_1","first-page":"5","article-title":"Dynamic malware analysis in the modern era---a state of the art survey","volume":"52","author":"Or-Meir O.","year":"2019","unstructured":"Or-Meir, O., Nissim, N., Elovici, Y., and Rokach, L. Dynamic malware analysis in the modern era---a state of the art survey. ACM Comput. Surv. 52, 5 (Sept. 2019).","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTXS.2018.00010"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3486880.3486884"},{"key":"e_1_3_2_1_48_1","first-page":"671","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Roy N.","year":"2016","unstructured":"Roy, N., and Choudhury, R. R. Ripple ii: faster communication through physical vibration. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) (2016), pp. 671--684."},{"key":"e_1_3_2_1_49_1","volume-title":"June 2","author":"Roy N.","year":"2020","unstructured":"Roy, N., Choudhury, R. R., and Al Hassanieh, H. Causing microphones to detect inaudible sounds and defense against inaudible attacks, June 2 2020. US Patent 10,672,416."},{"key":"e_1_3_2_1_50_1","first-page":"265","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Roy N.","year":"2015","unstructured":"Roy, N., Gowda, M., and Choudhury, R. R. Ripple: Communicating through physical vibration. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) (2015), pp. 265--278."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191789.3191799"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3089334"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"key":"e_1_3_2_1_55_1","first-page":"547","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy N.","year":"2018","unstructured":"Roy, N., Shen, S., Hassanieh, H., and Choudhury, R. R. Inaudible voice commands: The long-range attack and defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) (2018), USENIX Association, pp. 547--560."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430430"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2015.7490925"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_1_59_1","first-page":"1661","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2017), CCS '17, Association for Computing Machinery","author":"Tajik S.","unstructured":"Tajik, S., Lohrke, H., Seifert, J.-P., and Boit, C. On the power of optical contactless probing: Attacking bitstream encryption of fpgas. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2017), CCS '17, Association for Computing Machinery, p. 1661--1674."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139939"},{"key":"e_1_3_2_1_61_1","first-page":"2016","article-title":"Power consumption based android malware detection","author":"Yang H.","year":"2016","unstructured":"Yang, H., and Tang, R. Power consumption based android malware detection. Journal of Electrical and Computer Engineering 2016 (2016).","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"}],"event":{"name":"HotMobile '23: The 24th International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Newport Beach California","acronym":"HotMobile '23"},"container-title":["Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572864.3580339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3572864.3580339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:10Z","timestamp":1750183690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572864.3580339"}},"subtitle":["Toward Side-Channel Defense for Tiny IoT Devices"],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":62,"alternative-id":["10.1145\/3572864.3580339","10.1145\/3572864"],"URL":"https:\/\/doi.org\/10.1145\/3572864.3580339","relation":{},"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"2023-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}