{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:15:03Z","timestamp":1767924903616,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3656531","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Uncovering Software-Based Power Side-Channel Attacks on Apple M1\/M2 Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3454-6135","authenticated-orcid":false,"given":"Nikhil","family":"Chawla","sequence":"first","affiliation":[{"name":"Intel Corp., Hillsboro, OR, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0763-2003","authenticated-orcid":false,"given":"Chen","family":"Liu","sequence":"additional","affiliation":[{"name":"Intel Corp., Hillsboro, OR, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2948-6326","authenticated-orcid":false,"given":"Abhishek","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Intel Corp., Hillsboro, OR, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1976-256X","authenticated-orcid":false,"given":"Igor","family":"Chervatyuk","sequence":"additional","affiliation":[{"name":"Intel Corp., Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3610-8494","authenticated-orcid":false,"given":"Thais","family":"Moreira Hamasaki","sequence":"additional","affiliation":[{"name":"Intel Corp., Seattle, WA, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9663-5081","authenticated-orcid":false,"given":"Ke","family":"Sun","sequence":"additional","affiliation":[{"name":"Intel Corp., Hillsboro, OR, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0597-2784","authenticated-orcid":false,"given":"Henrique","family":"Kawakami","sequence":"additional","affiliation":[{"name":"Intel Corp., Seatlle, WA, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et al. PLATYPUS: Software-based Power Side-Channel Attacks on x86 in 2021 IEEE Symposium on Security and Privacy (SP)","author":"Lipp M.","year":"2021","unstructured":"Lipp, M. et al. PLATYPUS: Software-based Power Side-Channel Attacks on x86 in 2021 IEEE Symposium on Security and Privacy (SP) (2021), 355--371."},{"key":"e_1_3_2_1_2_1","volume-title":"MA","author":"Wang Y.","year":"2022","unstructured":"Wang, Y. et al. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 in 31st USENIX Security Symposium (USENIX Security 22) (USENIX Association, Boston, MA, Aug. 2022), 679--697."},{"key":"e_1_3_2_1_3_1","volume-title":"Frequency Throttling Side-Channel Attack in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery","author":"Liu C.","year":"2022","unstructured":"Liu, C. et al. Frequency Throttling Side-Channel Attack in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, Los Angeles, CA, USA, 2022), 1977--1991."},{"key":"e_1_3_2_1_4_1","volume-title":"Washington","author":"National Institute of Standards and Technology.","year":"2001","unstructured":"National Institute of Standards and Technology. ADVANCED ENCRYPTION STANDARD (AES) tech. rep. (U.S. Department of Commerce, Washington, D.C., 2001)."},{"key":"e_1_3_2_1_5_1","volume-title":"Practical Exploitation of Embedded Systems (Accessed","author":"Barisani A.","year":"2023","unstructured":"Barisani, A. Practical Exploitation of Embedded Systems (Accessed June 8, 2023). https:\/\/github.com\/abarisani\/abarisani.github.io\/blob\/master\/research\/smc\/practical_exploitation_of_embedded_systems.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"Ninjas and Harry Potter - \"Spell\" unking in Apple SMC Land (Accessed","author":"Ionescu A.","year":"2023","unstructured":"Ionescu, A. Ninjas and Harry Potter - \"Spell\" unking in Apple SMC Land (Accessed June 8, 2023). https:\/\/nosuchcon.org\/talks\/2013\/D1_02_Alex_Ninjas_and_Harry_Potter.pdf."},{"key":"e_1_3_2_1_7_1","volume-title":"Apple Developer Documentation - IOKit (Accessed","author":"Apple Inc.","year":"2023","unstructured":"Apple Inc. Apple Developer Documentation - IOKit (Accessed June 8, 2023). https:\/\/developer.apple.com\/documentation\/iokit\/1514274-ioconnectcallstructmethod."},{"key":"e_1_3_2_1_8_1","volume-title":"et al. Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard S.","year":"2008","unstructured":"Mangard, S. et al. Power analysis attacks: Revealing the secrets of smart cards (Springer Science & Business Media, 2008)."},{"key":"e_1_3_2_1_9_1","volume-title":"et al. Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels in USENIX Security","author":"Kogler A.","year":"2023","unstructured":"Kogler, A. et al. Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels in USENIX Security (2023)."},{"key":"e_1_3_2_1_10_1","volume-title":"et al. Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs","author":"Taneja H.","year":"2023","unstructured":"Taneja, H. et al. Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs 2023. arXiv: 2305.12784 [cs.CR]."},{"key":"e_1_3_2_1_11_1","unstructured":"VirtualSMC (Accessed June 2 2023). https:\/\/github.com\/acidanthera\/VirtualSMC\/tree\/master."},{"key":"e_1_3_2_1_12_1","volume-title":"b. SMC Fuzzer https:\/\/github.com\/theopolis\/smc-fuzzer. (Accessed","author":"Teddy Reed","year":"2023","unstructured":"Teddy Reed, b. SMC Fuzzer https:\/\/github.com\/theopolis\/smc-fuzzer. (Accessed May 26, 2023)."},{"key":"e_1_3_2_1_13_1","volume-title":"et al. stress-ng (Accessed","author":"King C. I.","year":"2023","unstructured":"King, C. I. et al. stress-ng (Accessed Nov 18, 2023). https:\/\/github.com\/ColinIanKing\/stress-ng."},{"key":"e_1_3_2_1_14_1","volume-title":"et al. A testing methodology for side-channel resistance validation in NIST non-invasive attack testing workshop 7","author":"Goodwill G.","year":"2011","unstructured":"Goodwill, G. et al. A testing methodology for side-channel resistance validation in NIST non-invasive attack testing workshop 7 (2011)."},{"key":"e_1_3_2_1_15_1","volume-title":"AES-Intrinsics https:\/\/github.com\/noloader\/AES-Intrinsics\/tree\/master. (Accessed","author":"Jeffrey Walton R. Z.","year":"2023","unstructured":"Jeffrey Walton, R. Z. AES-Intrinsics https:\/\/github.com\/noloader\/AES-Intrinsics\/tree\/master. (Accessed May 26, 2023)."},{"key":"e_1_3_2_1_16_1","volume-title":"b. socpowerbud https:\/\/github.com\/dehydratedpotato\/socpowerbud. (Accessed","author":"Teddy Reed","year":"2023","unstructured":"Teddy Reed, b. socpowerbud https:\/\/github.com\/dehydratedpotato\/socpowerbud. (Accessed May 26, 2023)."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Inc. 2020.2 IPU - Intel RAPL Interface Advisory https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00389.html. (Accessed June 9 2023)."},{"key":"e_1_3_2_1_18_1","volume-title":"CVE-2020-12912 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12912. (Accessed","author":"MITRE.","year":"2023","unstructured":"MITRE. CVE-2020-12912 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-12912. (Accessed June 9, 2023)."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel Inc. Running Average Power Limit Energy Reporting \/ CVE-2020-8694 CVE-2020-8695 \/ INTEL-SA-00389 https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/running-average-power-limit-energy-reporting.html. (Accessed June 9 2023)."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","location":"San Francisco CA USA","acronym":"DAC '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3656531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":19,"alternative-id":["10.1145\/3649329.3656531","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3656531","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}