{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:18Z","timestamp":1750219818565,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623994","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3722-8263","authenticated-orcid":false,"given":"Owen","family":"Pemberton","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8524-5282","authenticated-orcid":false,"given":"David","family":"Oswald","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium. https:\/\/a pi.semanticscholar.org\/CorpusID:230435874","author":"Aldaya Alejandro Cabrera","year":"2021","unstructured":"Alejandro Cabrera Aldaya and Billy Bob Brumley . 2021 . Hyperdegrade: from ghz to mhz effective cpu frequencies . In USENIX Security Symposium. https:\/\/a pi.semanticscholar.org\/CorpusID:230435874 . Alejandro Cabrera Aldaya and Billy Bob Brumley. 2021. Hyperdegrade: from ghz to mhz effective cpu frequencies. In USENIX Security Symposium. https:\/\/a pi.semanticscholar.org\/CorpusID:230435874."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991084"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--35326-0_52"},{"volume-title":"Springer","author":"Berthier Ma\u00ebl","key":"e_1_3_2_1_4_1","unstructured":"Ma\u00ebl Berthier , Yves Bocktaels , Julien Bringer , Herv\u00e9 Chabanne , Taoufik Chouta , Jean-Luc Danger , M\u00e9lanie Favre , and Tarik Graba . 2014. Studying leakages on an embedded biometric system using side channel analysis . In Constructive Side-Channel Analysis and Secure Design. Emmanuel Prouff, (Ed.) Springer International Publishing , Cham , 281--298. isbn: 978--3--319--10175-0. Ma\u00ebl Berthier, Yves Bocktaels, Julien Bringer, Herv\u00e9 Chabanne, Taoufik Chouta, Jean-Luc Danger, M\u00e9lanie Favre, and Tarik Graba. 2014. Studying leakages on an embedded biometric system using side channel analysis. In Constructive Side-Channel Analysis and Secure Design. Emmanuel Prouff, (Ed.) Springer International Publishing, Cham, 281--298. isbn: 978--3--319--10175-0."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.52"},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Biometric Technologies (BT2004)","author":"Cappelli Raffaele","year":"2004","unstructured":"Raffaele Cappelli , D Maio , and D Maltoni . 2004 . Sfinge: an approach to synthetic fingerprint generation . In International Workshop on Biometric Technologies (BT2004) , 147--154. Raffaele Cappelli, D Maio, and D Maltoni. 2004. Sfinge: an approach to synthetic fingerprint generation. In International Workshop on Biometric Technologies (BT2004), 147--154."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611771"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995294"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_10_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Gruss Daniel","year":"2015","unstructured":"Daniel Gruss , Raphael Spreitzer , and Stefan Mangard . 2015 . Cache template attacks: automating attacks on inclusive last-level caches . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C. , (Aug. 2015), 897--912. isbn: 978--1--939133--11--3. Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache template attacks: automating attacks on inclusive last-level caches. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., (Aug. 2015), 897--912. isbn: 978--1--939133--11--3."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_12_1","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni Davide","year":"1848","unstructured":"Davide Maltoni , Dario Maio , Anil K. Jain , and Salil Prabhakar . 2009. Handbook of Fingerprint Recognition . ( 2 nd ed.). Springer Publishing Company, Inc orporated. isbn: 1848 822537. Davide Maltoni, Dario Maio, Anil K. Jain, and Salil Prabhakar. 2009. Handbook of Fingerprint Recognition. (2nd ed.). Springer Publishing Company, Incorporated. isbn: 1848822537.","edition":"2"},{"key":"e_1_3_2_1_13_1","volume-title":"d.] Digitalpersona u.are.u 4000 scanner. Retrieved","author":"NEUROTECHNOLOGY.","year":"2023","unstructured":"NEUROTECHNOLOGY. [n. d.] Digitalpersona u.are.u 4000 scanner. Retrieved Sept. 18, 2023 from https:\/\/www.neurotechnology.com\/fingerprint-scanner-di gitalpersona-u-are-u-4000.html. NEUROTECHNOLOGY. [n. d.] Digitalpersona u.are.u 4000 scanner. Retrieved Sept. 18, 2023 from https:\/\/www.neurotechnology.com\/fingerprint-scanner-di gitalpersona-u-are-u-4000.html."},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Indian Institute of Science. [n. d.] Anguli","year":"2023","unstructured":"Indian Institute of Science. [n. d.] Anguli : synthetic fingerprint generator . Retrieved Sept. 18, 2023 from https:\/\/dsl.cds.iisc.ac.in\/projects\/Anguli\/. Indian Institute of Science. [n. d.] Anguli: synthetic fingerprint generator. Retrieved Sept. 18, 2023 from https:\/\/dsl.cds.iisc.ac.in\/projects\/Anguli\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"National Institute of Standards and Technology. [n. d.]","year":"2023","unstructured":"National Institute of Standards and Technology. [n. d.] Nist biometric image software (nbis) . Retrieved Sept. 18, 2023 from https:\/\/www.nist.gov\/services-r esources\/sof tware\/nist-biometric-image-sof tware-nbis. National Institute of Standards and Technology. [n. d.] Nist biometric image software (nbis). Retrieved Sept. 18, 2023 from https:\/\/www.nist.gov\/services-r esources\/sof tware\/nist-biometric-image-sof tware-nbis."},{"volume-title":"Cryptographers' track at the RSA conference","author":"Osvik Dag Arne","key":"e_1_3_2_1_16_1","unstructured":"Dag Arne Osvik , Adi Shamir , and Eran Tromer . 2006. Cache attacks and countermeasures: the case of aes . In Cryptographers' track at the RSA conference . Springer , 1--20. Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache attacks and countermeasures: the case of aes. In Cryptographers' track at the RSA conference. Springer, 1--20."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00042"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23221"},{"key":"e_1_3_2_1_19_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . Flush reload: a high resolution, low noise, l3 cache side-channel attack . In 23rd USENIX Security Symposium (USENIX Security 14) , 719--732. Yuval Yarom and Katrina Falkner. 2014. Flush reload: a high resolution, low noise, l3 cache side-channel attack. In 23rd USENIX Security Symposium (USENIX Security 14), 719--732."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":19,"alternative-id":["10.1145\/3605769.3623994","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623994","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}