{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:59Z","timestamp":1774448999673,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640355","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"862-878","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Pentimento: Data Remanence in Cloud FPGAs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5936-033X","authenticated-orcid":false,"given":"Colin","family":"Drewes","sequence":"first","affiliation":[{"name":"Computer Science, Stanford University, Stanford, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1213-421X","authenticated-orcid":false,"given":"Olivia","family":"Weng","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4283-0833","authenticated-orcid":false,"given":"Andres","family":"Meza","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8355-6906","authenticated-orcid":false,"given":"Alric","family":"Althoff","sequence":"additional","affiliation":[{"name":"ARM, Austin, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9121-9734","authenticated-orcid":false,"given":"David","family":"Kohlbrenner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9062-5570","authenticated-orcid":false,"given":"Ryan","family":"Kastner","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4587-8947","authenticated-orcid":false,"given":"Dustin","family":"Richmond","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Adds New Features, and Improves Development Tools. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2018\/10\/amazon-ec2-f1-instance-expands-to-more-regions-adds\\-new-features-and-improves-development-tools\/","author":"Instance Amazon","year":"2018","unstructured":"Amazon EC2 F1 Instance Expands to More Regions, Adds New Features, and Improves Development Tools. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2018\/10\/amazon-ec2-f1-instance-expands-to-more-regions-adds\\-new-features-and-improves-development-tools\/, 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.xilinx.com\/applications\/data-center\/video-imaging.html","author":"Transcoding Video","year":"2022","unstructured":"Video Transcoding. https:\/\/www.xilinx.com\/applications\/data-center\/video-imaging.html, 2022."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_26"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2004.03.019"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927390"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113304"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2012.6242496"},{"key":"e_1_3_2_1_8_1","first-page":"103","volume-title":"Ramakrishna Gummadi. Determinating Timing Channels in Compute Clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop","author":"Aviram Amittai","year":"2010","unstructured":"Amittai Aviram, Sen Hu, Bryan Ford, and Ramakrishna Gummadi. Determinating Timing Channels in Compute Clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 103--108, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"AWS FPGA - Frequently Asked Questions. https:\/\/github.com\/aws\/aws-fpga\/blob\/master\/FAQs.md","author":"AWS.","year":"2022","unstructured":"AWS. AWS FPGA - Frequently Asked Questions. https:\/\/github.com\/aws\/aws-fpga\/blob\/master\/FAQs.md, 2022."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2006.320885"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Christophe Bobda Joel Mandebi Mbongue Paul Chow Mohammad Ewais Naif Tarafdar Juan Camilo Vega Ken Eguro Dirk Koch Suranga Handagala Miriam Leeser et al. The Future of FPGA Acceleration in Datacenters and the Cloud. ACM Transactions on Reconfigurable Technology and Systems (TRETS) 15(3):1--42 2022.","DOI":"10.1145\/3506713"},{"key":"e_1_3_2_1_12_1","first-page":"410","volume-title":"Ananth Raghunathan. Key Homomorphic PRFs and Their Applications. In Annual Cryptology Conference","author":"Boneh Dan","year":"2013","unstructured":"Dan Boneh, Kevin Lewi, Hart Montgomery, and Ananth Raghunathan. Key Homomorphic PRFs and Their Applications. In Annual Cryptology Conference, pages 410--428. Springer, 2013."},{"key":"e_1_3_2_1_13_1","first-page":"103","volume-title":"Vaughn Betz. Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs. In 2020 International Conference on Field-Programmable Technology (ICFPT)","author":"Boutros Andrew","year":"2020","unstructured":"Andrew Boutros, Mathew Hall, Nicolas Papernot, and Vaughn Betz. Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs. In 2020 International Conference on Field-Programmable Technology (ICFPT), pages 103--111. IEEE, 2020."},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"CMOS. In Proceedings of the IEEE 2012 Custom Integrated Circuits Conference","author":"Cakir Cagla","year":"2012","unstructured":"Cagla Cakir, Mudit Bhargava, and Ken Mai. 6T SRAM and 3T DRAM Data Retention and Remanence Characterization in 65nm bulk CMOS. In Proceedings of the IEEE 2012 Custom Integrated Circuits Conference, pages 1--4. IEEE, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"DL Kwong. Dynamic NBTI of PMOS Transistors and Its Impact on Device Lifetime. In 2003 IEEE International Reliability Physics Symposium Proceedings, 2003","author":"Chen GCKY","year":"2003","unstructured":"GCKY Chen, KY Chuah, MF Li, Daniel SH Chan, CH Ang, JZ Zheng, Y Jin, and DL Kwong. Dynamic NBTI of PMOS Transistors and Its Impact on Device Lifetime. In 2003 IEEE International Reliability Physics Symposium Proceedings, 2003. 41st Annual., pages 196--202. IEEE, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Peng Wei. When Spark Meets FPGAs: A Case Study for Next-Generation DNA Sequencing Acceleration. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16)","author":"Chen Yu-Ting","year":"2016","unstructured":"Yu-Ting Chen, Jason Cong, Zhenman Fang, Jie Lei, and Peng Wei. When Spark Meets FPGAs: A Case Study for Next-Generation DNA Sequencing Acceleration. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16), 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2019.2950008"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543622.3573193"},{"key":"e_1_3_2_1_19_1","first-page":"98","volume-title":"Sam Scott. Key Rotation for Authenticated Encryption. In Annual International Cryptology Conference","author":"Everspaugh Adam","year":"2017","unstructured":"Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, and Sam Scott. Key Rotation for Authenticated Encryption. In Annual International Cryptology Conference, pages 98--129. Springer, 2017."},{"key":"e_1_3_2_1_20_1","first-page":"113","volume-title":"FPGA Technology. In Proceedings of the ACM\/SIGDA international symposium on Field programmable gate arrays","author":"Favi Claudio","year":"2009","unstructured":"Claudio Favi and Edoardo Charbon. A 17ps Time-to-Digital Converter Implemented in 65nm FPGA Technology. In Proceedings of the ACM\/SIGDA international symposium on Field programmable gate arrays, pages 113--120, 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00012"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Jakub Szefer. Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. In 2019 IEEE 37th International Conference on Computer Design (ICCD)","author":"Giechaskiel Ilias","year":"2019","unstructured":"Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer. Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. In 2019 IEEE 37th International Conference on Computer Design (ICCD), pages 1--10. IEEE, 2019."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00070"},{"key":"e_1_3_2_1_24_1","first-page":"1007","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Glamo\u010danin Ognjen","year":"2020","unstructured":"Ognjen Glamo\u010danin, Louis Coulon, Francesco Regazzoni, and Mirjana Stojilovi\u0107. Are Cloud FPGAs Really Vulnerable to Power Analysis Attacks? In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1007--1010. IEEE, 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Syed Hashim Gillani, and Mehdi B Tahoori. Voltage-Based Covert Channels Using FPGAs. ACM Transactions on Design Automation of Electronic Systems (TODAES), 26(6):1--25","author":"Gnad Dennis RE","year":"2021","unstructured":"Dennis RE Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, and Mehdi B Tahoori. Voltage-Based Covert Channels Using FPGAs. ACM Transactions on Design Automation of Electronic Systems (TODAES), 26(6):1--25, 2021."},{"key":"e_1_3_2_1_26_1","first-page":"12","volume-title":"Mehdi B Tahoori. Analysis of Transient Voltage Fluctuations in FPGAs. In 2016 International Conference on Field-Programmable Technology (FPT)","author":"Gnad Dennis RE","year":"2016","unstructured":"Dennis RE Gnad, Fabian Oboril, Saman Kiamehr, and Mehdi B Tahoori. Analysis of Transient Voltage Fluctuations in FPGAs. In 2016 International Conference on Field-Programmable Technology (FPT), pages 12--19. IEEE, 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056840"},{"key":"e_1_3_2_1_28_1","volume-title":"Dustin Richmond. Classifying Computations on Multi-Tenant FPGAs. In Design Automation Conference (DAC), DAC '21","author":"Gobulukoglu Mustafa","year":"2021","unstructured":"Mustafa Gobulukoglu, Colin Drewes, Bill Hunter, Ryan Kastner, and Dustin Richmond. Classifying Computations on Multi-Tenant FPGAs. In Design Automation Conference (DAC), DAC '21, 2021."},{"key":"e_1_3_2_1_29_1","first-page":"198","volume-title":"Goli\u0107 and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In International Workshop on Cryptographic Hardware and Embedded Systems","author":"Jovan","year":"2002","unstructured":"Jovan D Goli\u0107 and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 198--212. Springer, 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2007.4419069"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIRW.2010.5706473"},{"key":"e_1_3_2_1_32_1","volume-title":"Beware of Discarding Used SRAMs: Information is Stored Permanently","author":"Hovanes Joshua","year":"2022","unstructured":"Joshua Hovanes, Yadi Zhong, and Ujjwal Guin. Beware of Discarding Used SRAMs: Information is Stored Permanently, 2022."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.44-68"},{"key":"e_1_3_2_1_35_1","volume-title":"Dennis RE Gnad, and Mehdi B Tahoori. Mitigating Electrical-level Attacks towards Secure Multi-Tenant FPGAs in the Cloud. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 12(3):1--26","author":"Krautter Jonas","year":"2019","unstructured":"Jonas Krautter, Dennis RE Gnad, and Mehdi B Tahoori. Mitigating Electrical-level Attacks towards Secure Multi-Tenant FPGAs in the Cloud. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 12(3):1--26, 2019."},{"key":"e_1_3_2_1_36_1","volume-title":"Krishnan. Material Dependence of Hydrogen Diffusion: Implications for NBTI Degradation. In IEEE InternationalElectron Devices Meeting, 2005","author":"Krishnan AT","year":"2005","unstructured":"AT Krishnan, C Chancellor, S Chakravarthi, PE Nicollian, V Reddy, A Varghese, RB Khamankar, and S Krishnan. Material Dependence of Hydrogen Diffusion: Implications for NBTI Degradation. In IEEE InternationalElectron Devices Meeting, 2005. IEDM Technical Digest., pages 4--pp. IEEE, 2005."},{"key":"e_1_3_2_1_37_1","first-page":"6","volume-title":"Impact of NBTI on SRAM Read Stability and Design for Reliability. In 7th International Symposium on Quality Electronic Design (ISQED'06)","author":"Kumar S.V.","year":"2006","unstructured":"S.V. Kumar, K.H. Kim, and S.S. Sapatnekar. Impact of NBTI on SRAM Read Stability and Design for Reliability. In 7th International Symposium on Quality Electronic Design (ISQED'06), pages 6 pp.--218, 2006."},{"key":"e_1_3_2_1_38_1","volume-title":"Khoa Dang Pham, and Dirk Koch. FPGADefender: Malicious Self-oscillator Scanning for Xilinx UltraScale + FPGAs. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 13(3):1--31","author":"La Tuan Minh","year":"2020","unstructured":"Tuan Minh La, Kaspar Matas, Nikola Grunchevski, Khoa Dang Pham, and Dirk Koch. FPGADefender: Malicious Self-oscillator Scanning for Xilinx UltraScale + FPGAs. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 13(3):1--31, 2020."},{"key":"e_1_3_2_1_39_1","first-page":"2D","volume-title":"Jongwoo Park. Technology Scaling on High-K & Metal-Gate FinFET BTI Reliability. In 2013 IEEE International Reliability Physics Symposium (IRPS)","author":"Lee Kyong Taek","unstructured":"Kyong Taek Lee, Wonchang Kang, Eun-Ae Chung, Gunrae Kim, Hyewon Shim, Hyunwoo Lee, Hyejin Kim, Minhyeok Choe, Nae-In Lee, Anuj Patel, Junekyun Park, and Jongwoo Park. Technology Scaling on High-K & Metal-Gate FinFET BTI Reliability. In 2013 IEEE International Reliability Physics Symposium (IRPS), pages 2D.1.1--2D.1.4, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2021.3127288"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM13553.2020.9372009"},{"key":"e_1_3_2_1_42_1","first-page":"295","volume-title":"Xiaolin Xu. DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. In 2021 58th ACM\/IEEE Design Automation Conference (DAC)","author":"Luo Yukui","year":"2021","unstructured":"Yukui Luo, Cheng Gongye, Yunsi Fei, and Xiaolin Xu. DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. In 2021 58th ACM\/IEEE Design Automation Conference (DAC), pages 295--300. IEEE, 2021."},{"issue":"3","key":"e_1_3_2_1_43_1","first-page":"901","volume":"60","author":"Mahapatra S","year":"2013","unstructured":"S Mahapatra, N Goel, S Desai, S Gupta, B Jose, S Mukhopadhyay, K Joshi, A Jain, AE Islam, and MA Alam. A Comparative Study of Different Physics-Based NBTI Models. IEEE Transactions on Electron Devices, 60(3):901--916, 2013.","journal-title":"MA Alam. A Comparative Study of Different Physics-Based NBTI Models. IEEE Transactions on Electron Devices"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2508-9"},{"key":"e_1_3_2_1_45_1","first-page":"1745","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Mahmoud Dina","year":"2019","unstructured":"Dina Mahmoud and Mirjana Stojilovi\u0107. Timing Violation Induced Faults in Multi-Tenant FPGAs. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1745--1750. IEEE, 2019."},{"key":"e_1_3_2_1_46_1","first-page":"722","volume-title":"Vijaykrishnan Narayanan. Thermal-Aware Reliability Analysis for Platform FPGAs. In 2008 IEEE\/ACM International Conference on Computer-Aided Design","author":"Mangalagiri Prasanth","year":"2008","unstructured":"Prasanth Mangalagiri, Sungmin Bae, Ramakrishnan Krishnan, Yuan Xie, and Vijaykrishnan Narayanan. Thermal-Aware Reliability Analysis for Platform FPGAs. In 2008 IEEE\/ACM International Conference on Computer-Aided Design, pages 722--727. IEEE, 2008."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00018"},{"key":"e_1_3_2_1_49_1","first-page":"2F","volume-title":"2015 IEEE International Reliability Physics Symposium","author":"Novak S.","unstructured":"S. Novak, C. Parker, D. Becher, M. Liu, M. Agostinelli, M. Chahal, P. Packan, P. Nayak, S. Ramey, and S. Natarajan. Transistor Aging and Reliability in 14nm Tri-Gate Technology. In 2015 IEEE International Reliability Physics Symposium, pages 2F.2.1--2F.2.5, 2015."},{"key":"e_1_3_2_1_50_1","volume-title":"OpenTitan FPGA setup. https:\/\/docs.opentitan.org\/doc\/getting_started\/setup_fpga\/","year":"2022","unstructured":"OpenTitan. OpenTitan FPGA setup. https:\/\/docs.opentitan.org\/doc\/getting_started\/setup_fpga\/, 2022."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Fabien AP Petitcolas. Kerckhoffs' Principle. 2011.","DOI":"10.1007\/978-1-4419-5906-5_487"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645584"},{"key":"e_1_3_2_1_53_1","first-page":"143","volume-title":"Adrian Macias. Accelerating Homomorphic Evaluation on Reconfigurable Hardware. In International Workshop on Cryptographic Hardware and Embedded Systems","author":"P\u00f6ppelmann Thomas","year":"2015","unstructured":"Thomas P\u00f6ppelmann, Michael Naehrig, Andrew Putnam, and Adrian Macias. Accelerating Homomorphic Evaluation on Reconfigurable Hardware. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 143--163. Springer, 2015."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665678"},{"key":"e_1_3_2_1_55_1","first-page":"1919","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Rakin Adnan Siraj","year":"2021","unstructured":"Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, and Deliang Fan. Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. In 30th USENIX Security Symposium (USENIX Security 21), pages 1919--1936, 2021."},{"key":"e_1_3_2_1_56_1","first-page":"2","volume-title":"2014 IEEE International Reliability Physics Symposium","author":"Ramey S","unstructured":"S Ramey, J Hicks, LS Liyanage, and S Novak. BTI Recovery in 22nm Tri-gate Technology. In 2014 IEEE International Reliability Physics Symposium, pages XT--2. IEEE, 2014."},{"key":"e_1_3_2_1_57_1","first-page":"14","volume-title":"Everett CC Yeh. Universal Recovery Behavior of Negative Bias Temperature Instability. In IEEE International Electron Devices Meeting 2003","author":"Rangan Sanjay","year":"2003","unstructured":"Sanjay Rangan, Neal Mielke, and Everett CC Yeh. Universal Recovery Behavior of Negative Bias Temperature Instability. In IEEE International Electron Devices Meeting 2003, pages 14--3. IEEE, 2003."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELPHY.2006.251260"},{"key":"e_1_3_2_1_59_1","first-page":"199","volume-title":"Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of the 16th ACM conference on Computer and communications security","author":"Ristenpart Thomas","year":"2009","unstructured":"Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199--212, 2009."},{"key":"e_1_3_2_1_60_1","first-page":"1111","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Schellenberg Falk","year":"2018","unstructured":"Falk Schellenberg, Dennis RE Gnad, Amir Moradi, and Mehdi B Tahoori. An Inside Job: Remote Power Analysis Attacks on FPGAs. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1111--1116. IEEE, 2018."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240841"},{"key":"e_1_3_2_1_62_1","volume-title":"Verilog implementation of the symmetric block cipher AES. https:\/\/github.com\/secworks\/aes","year":"2023","unstructured":"Secworks. Verilog implementation of the symmetric block cipher AES. https:\/\/github.com\/secworks\/aes, 2023."},{"key":"e_1_3_2_1_63_1","first-page":"323","volume-title":"Stott and Peter YK Cheung. Improving FPGA Reliability with Wear-Levelling. In 2011 21st International Conference on Field Programmable Logic and Applications","author":"Edward","year":"2011","unstructured":"Edward Stott and Peter YK Cheung. Improving FPGA Reliability with Wear-Levelling. In 2011 21st International Conference on Field Programmable Logic and Applications, pages 323--328. IEEE, 2011."},{"key":"e_1_3_2_1_64_1","first-page":"229","volume-title":"Peter YK Cheung. Degradation in FPGAs: Measurement and Modelling. In Proceedings of the 18th annual ACM\/SIGDA International Symposium on Field Programmable Gate Arrays","author":"Stott Edward A","year":"2010","unstructured":"Edward A Stott, Justin SJ Wong, Pete Sedcole, and Peter YK Cheung. Degradation in FPGAs: Measurement and Modelling. In Proceedings of the 18th annual ACM\/SIGDA International Symposium on Field Programmable Gate Arrays, pages 229--238, 2010."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00035"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT51103.2020.00029"},{"key":"e_1_3_2_1_67_1","first-page":"298","volume-title":"Tian and Jakub Szefer. Temporal Thermal Covert Channels in Cloud FPGAs. In Proceedings of the 2019 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays","author":"Shanquan","year":"2019","unstructured":"Shanquan Tian and Jakub Szefer. Temporal Thermal Covert Channels in Cloud FPGAs. In Proceedings of the 2019 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays, pages 298--303, 2019."},{"key":"e_1_3_2_1_68_1","first-page":"58","volume-title":"Jakub Szefer. Fingerprinting Cloud FPGA Infrastructures. In Proceedings of the 2020 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays","author":"Tian Shanquan","year":"2020","unstructured":"Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer. Fingerprinting Cloud FPGA Infrastructures. In Proceedings of the 2020 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays, pages 58--64, 2020."},{"key":"e_1_3_2_1_69_1","volume-title":"January 22","author":"Trimberger Stephen M","year":"2013","unstructured":"Stephen M Trimberger. System and method of detecting and reversing data imprinting in memory, January 22 2013. US Patent 8,359,447."},{"key":"e_1_3_2_1_70_1","first-page":"1","volume-title":"Stathis. Bias Temperature Instability Reliability in Stacked Gate-All-Around Nanosheet Transistor. In 2019 IEEE International Reliability Physics Symposium (IRPS)","author":"Wang Miaomiao","year":"2019","unstructured":"Miaomiao Wang, Jingyun Zhang, Huimei Zhou, Richard G. Southwick, Robin Hsin Kuo Chao, Xin Miao, Veeraraghavan S. Basker, Tenko Yamashita, Dechao Guo, Gauri Karve, Huiming Bu, and James H. Stathis. Bias Temperature Instability Reliability in Stacked Gate-All-Around Nanosheet Transistor. In 2019 IEEE International Reliability Physics Symposium (IRPS), pages 1--6, 2019."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2010.5703430"},{"key":"e_1_3_2_1_72_1","first-page":"2","volume-title":"A 7nm FinFET Technology Featuring EUV Patterning and Dual Strained High Mobility Channels. In 2016 IEEE international electron devices meeting (IEDM)","author":"Xie Ruilong","year":"2016","unstructured":"Ruilong Xie, Pietro Montanini, Kerem Akarvardar, N Tripathi, B Haran, S Johnson, T Hook, Bassem Hamieh, Daniel Corliss, Junli Wang, et al. A 7nm FinFET Technology Featuring EUV Patterning and Dual Strained High Mobility Channels. In 2016 IEEE international electron devices meeting (IEDM), pages 2--7. IEEE, 2016."},{"key":"e_1_3_2_1_73_1","volume-title":"Xilinx Ultrascale Clocking. https:\/\/docs.xilinx.com\/v\/u\/en-US\/ug572-ultrascale-clocking","year":"2018","unstructured":"Xilinx. Xilinx Ultrascale Clocking. https:\/\/docs.xilinx.com\/v\/u\/en-US\/ug572-ultrascale-clocking, 2018."},{"key":"e_1_3_2_1_74_1","volume-title":"FINN examples. https:\/\/github.com\/Xilinx\/finn-examples","year":"2022","unstructured":"Xilinx. FINN examples. https:\/\/github.com\/Xilinx\/finn-examples, 2022."},{"key":"e_1_3_2_1_75_1","first-page":"929","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu, Haining Wang, and Zhenyu Wu. A Measurement Study on Co-residence Threat inside the Cloud. In 24th USENIX Security Symposium (USENIX Security 15), pages 929--944, 2015."},{"issue":"9","key":"e_1_3_2_1_76_1","first-page":"1420","volume":"11","author":"Zhang Jian Fu","year":"2022","unstructured":"Jian Fu Zhang, Rui Gao, Meng Duan, Zhigang Ji, Weidong Zhang, and John Marsland. Bias Temperature Instability of MOSFETs: Physical Processes, Models, and Prediction. Electronics, 11(9):1420, 2022.","journal-title":"Prediction. Electronics"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_78_1","first-page":"229","volume-title":"Zhao and G Edward Suh. FPGA-Based Remote Power Side-Channel Attacks. In 2018 IEEE Symposium on Security and Privacy (SP)","author":"Mark","year":"2018","unstructured":"Mark Zhao and G Edward Suh. FPGA-Based Remote Power Side-Channel Attacks. In 2018 IEEE Symposium on Security and Privacy (SP), pages 229--244. IEEE, 2018."},{"key":"e_1_3_2_1_79_1","volume-title":"Low-Cost Sensing with Ring Oscillator Arrays for Healthier Reconfigurable Systems. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 5(1):1--26","author":"Zick Kenneth M","year":"2012","unstructured":"Kenneth M Zick and John P Hayes. Low-Cost Sensing with Ring Oscillator Arrays for Healthier Reconfigurable Systems. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 5(1):1--26, 2012."},{"key":"e_1_3_2_1_80_1","first-page":"1","volume-title":"Matthew French. High-Precision Self-Characterization for the LUT Burn-in Information Leakage Threat. In 2014 24th International Conference on Field Programmable Logic and Applications (FPL)","author":"Zick Kenneth M","year":"2014","unstructured":"Kenneth M Zick, Sen Li, and Matthew French. High-Precision Self-Characterization for the LUT Burn-in Information Leakage Threat. In 2014 24th International Conference on Field Programmable Logic and Applications (FPL), pages 1--6. IEEE, 2014."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:29:27Z","timestamp":1750285767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":80,"alternative-id":["10.1145\/3620665.3640355","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640355","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}