{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T10:51:47Z","timestamp":1761821507628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2023R1A2C2006862"],"award-info":[{"award-number":["2023R1A2C2006862"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3659434","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1952-1954","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["POSTER: On the Feasibility of Inferring SGX Execution through PMU"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1081-1133","authenticated-orcid":false,"given":"Woomin","family":"Lee","sequence":"first","affiliation":[{"name":"Korea University, Seoul, Korea, South ? Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1887-7009","authenticated-orcid":false,"given":"Taehun","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Korea, South ? Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4831-7392","authenticated-orcid":false,"given":"Youngjoo","family":"Shin","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"volume-title":"SoK: The challenges, pitfalls, and perils of using hardware performance counters for security","author":"Das Sanjeev","key":"e_1_3_2_1_1_1","unstructured":"Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, and Fabian Monrose. 2019. SoK: The challenges, pitfalls, and perils of using hardware performance counters for security. In IEEE SP. 20--38."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel. 2023. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html"},{"key":"e_1_3_2_1_3_1","volume-title":"PLATYPUS: Software-based power side-channel attacks on x86","author":"Lipp Moritz","year":"2021","unstructured":"Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, and Daniel Gruss. 2021. PLATYPUS: Software-based power side-channel attacks on x86. In IEEE SP. 355--371."},{"key":"e_1_3_2_1_4_1","volume-title":"Downfall: Exploiting Speculative Data Gathering. In USENIX Security. 7179--7193.","author":"Moghimi Daniel","year":"2023","unstructured":"Daniel Moghimi. 2023. Downfall: Exploiting Speculative Data Gathering. In USENIX Security. 7179--7193."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jo Van Bulck Frank Piessens and Raoul Strackx. 2017. SGX-Step: A practical attack framework for precise enclave execution control. In SysTEX. 1--6.","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Yihao Yang Pengfei Qiu Chunlu Wang Yu Jin Qiang Gao Xiaoyong Li Dong-Sheng Wang and Gang Qu. 2023. Exploration and Exploitation of Hidden PMU Events. In ICCAD. 1--9.","DOI":"10.1109\/ICCAD57390.2023.10323695"},{"key":"e_1_3_2_1_7_1","unstructured":"Zhiyuan Zhang Mingtian Tao Sioli O'Connell Chitchanok Chuengsatiansup Daniel Genkin and Yuval Yarom. 2023. BunnyHop: Exploiting the Instruction Prefetcher. In USENIX Security. 7321--7337."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3659434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3659434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":7,"alternative-id":["10.1145\/3634737.3659434","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3659434","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}