{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:19:35Z","timestamp":1760347175678,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61672062"],"award-info":[{"award-number":["Grant No. 61672062"]}],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3656525","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4185-7214","authenticated-orcid":false,"given":"Xin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Software and Microelectronics, Peking University, Beijing, Beijing, China"},{"name":"PKU-OCTA Laboratory for Blockchain and Privacy Computing, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3604-5369","authenticated-orcid":false,"given":"Zhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Western Australia, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0605-6043","authenticated-orcid":false,"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University, Beijing, Beijing, China"},{"name":"PKU-OCTA Laboratory for Blockchain and Privacy Computing, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7294-2724","authenticated-orcid":false,"given":"Wenhao","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5783-2172","authenticated-orcid":false,"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4742-6345","authenticated-orcid":false,"given":"Zhuoxi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University, Beijing, Beijing, China"},{"name":"PKU-OCTA Laboratory for Blockchain and Privacy Computing, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1268-836X","authenticated-orcid":false,"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901322"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527416"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00250"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_2_1_5_1","volume-title":"Thermalbleed: A practical thermal side-channel attack","author":"Kim T.","year":"2022","unstructured":"T. Kim and Y. Shin. Thermalbleed: A practical thermal side-channel attack. IEEE Access, 2022."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"e_1_3_2_1_7_1","author":"Ma H.","year":"2021","unstructured":"H. Ma, J. Tian, D. Gao, and C. Jia. On the effectiveness of using graphics interrupt as a side channel for user behavior snooping. IEEE Transactions on Dependable and Secure Computing, pages 3257--3270, 2021.","journal-title":"IEEE Transactions on Dependable and Secure Computing, pages 3257--3270"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","author":"Masti R. J.","year":"2015","unstructured":"R. J. Masti, D. Rai, A. Ranganathan, C. M\u00fcller, L. Thiele, and S. Capkun. Thermal covert channels on multi-core platforms. In USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00029"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23027"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674829"},{"key":"e_1_3_2_1_12_1","volume-title":"Ezclone: Improving dnn model extraction attack via shape distillation from gpu execution profiles. arXiv preprint","author":"Weiss J. O.","year":"2023","unstructured":"J. O. Weiss, T. Alves, and S. Kundu. Ezclone: Improving dnn model extraction attack via shape distillation from gpu execution profiles. arXiv preprint, 2023."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","author":"Zhang R.","year":"2023","unstructured":"R. Zhang, T. Kim, D. Weber, and M. Schwarz. (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. In USENIX Security Symposium, 2023."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3656525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":13,"alternative-id":["10.1145\/3649329.3656525","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3656525","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}