{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:20:41Z","timestamp":1758846041220,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16ME0602"],"award-info":[{"award-number":["16ME0602"]}]},{"name":"Saxon State Parliament in Germany"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1145\/3676151.3719370","type":"proceedings-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:57:09Z","timestamp":1746233829000},"page":"232-239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of User-space Idle State Instructions on x86 Processors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1053-0894","authenticated-orcid":false,"given":"Malte-Christian","family":"Kuns","sequence":"first","affiliation":[{"name":"Institute for Computer Engineering, Faculty of Computer Science, TU Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9601-8683","authenticated-orcid":false,"given":"Hannes","family":"Tr\u00f6pgen","sequence":"additional","affiliation":[{"name":"Information Services and High Performance Computing (ZIH), Center for Interdisciplinary Digital Sciences (CIDS), TU Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0666-4166","authenticated-orcid":false,"given":"Robert","family":"Sch\u00f6ne","sequence":"additional","affiliation":[{"name":"Information Services and High Performance Computing (ZIH), Center for Interdisciplinary Digital Sciences (CIDS), TU Dresden, Dresden, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual Volume 2 (2A 2B 2C & 2D): Instruction Set Reference A-Z. Technical Report 325462-085US. Intel Corporation."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. 12th Generation Intel Core Processors Datasheet Volume 1 of 2. Technical Report 655258 Rev.: 010. Intel Corporation."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions. Technical Report 24594 Rev. 3.36. AMD."},{"key":"e_1_3_2_1_4_1","unstructured":"2024. Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual: Volume 1. Technical Report 248966-050US. Intel Corporation."},{"key":"e_1_3_2_1_5_1","unstructured":"acpi 2022. Advanced Configuration and Power Interface (ACPI) specification revision 6.5. http:\/\/www.uefi.org\/specifications online at uefi.org (accessed 2022-11-12)."},{"key":"e_1_3_2_1_6_1","volume-title":"Rendell","author":"Antony Joseph","year":"2006","unstructured":"Joseph Antony, Pete P. Janes, and Alistair P. Rendell. 2006. Exploring Thread and Memory Placement on NUMA Architectures: Solaris and Linux, UltraSPARC\/Fire-Plane and Opteron\/HyperTransport. In High Performance Computing - HiPC 2006, Yves Robert, Manish Parashar, Ramamurthy Badrinath, and Viktor K. Prasanna (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 338--352."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056047"},{"key":"e_1_3_2_1_8_1","volume-title":"Unlocking Energy. In 2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Falsafi Babak","year":"2016","unstructured":"Babak Falsafi, Rachid Guerraoui, Javier Picorel, and Vasileios Trigonakis. 2016. Unlocking Energy. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). USENIX Association, Denver, CO, 393--406. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/falsafi"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301501"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2015.70"},{"key":"e_1_3_2_1_11_1","unstructured":"Thomas Ilsche. 2020. Energy Measurements of High Performance Computing Systems: From Instrumentation to Analysis. PhD thesis https:\/\/nbn-resolving.org\/urn:nbn:de:bsz:14-qucosa2-716000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2015.7393710"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAAC49578.2019.00007"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00114"},{"key":"e_1_3_2_1_15_1","unstructured":"Hao-Qiang Jin Michael Frumkin and Jerry Yan. 1999. The OpenMP implementation of NAS parallel benchmarks and its performance. (1999). https:\/\/www.nas.nasa.gov\/assets\/pdf\/techreports\/1999\/nas-99-011.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71819-4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.14855168"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560682"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-013-0240-x"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508269"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/GREENCOMP.2010.5598316"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Ottawa Linux Symposium (OLS). online at kernel.org (accessed 2022-11-12)","author":"Pallipadi Venkatesh","year":"2007","unstructured":"Venkatesh Pallipadi, Shaohua Li, and Adam Belay. 2007. cpuidle: Do nothing, efficiently. In Proceedings of the Ottawa Linux Symposium (OLS). online at kernel.org (accessed 2022-11-12)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Ottawa Linux Symposium (OLS). online at kernel.org (accessed 2017-01-12)","author":"Pallipadi Venkatesh","year":"2006","unstructured":"Venkatesh Pallipadi and Alexey Starikovskiy. 2006. The Ondemand Governor Past, Present, and Future. In Proceedings of the Ottawa Linux Symposium (OLS). online at kernel.org (accessed 2017-01-12)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS48598.2019.9188239"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/e2sc.2016.015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-014-0270-z"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3629526.3645040"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3632366.3632385"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489525.3511689"},{"key":"e_1_3_2_1_31_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Yingchen","year":"2022","unstructured":"Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, and David Kohlbrenner. 2022. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 679--697. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/wangyingchen"},{"key":"e_1_3_2_1_32_1","unstructured":"ZES ZIMMER Electronic Systems GmbH 2007. 1-Phasen-Pr\u00e4zisions- Leistungsme\u00dfger\u00e4t LMG95 Benutzerhandbuch. ZES ZIMMER Electronic Systems GmbH Tabaksm\u00fchlenweg 30 61440 Oberursel. http:\/\/www.zes.com"},{"key":"e_1_3_2_1_33_1","unstructured":"ZES ZIMMER Electronic Systems GmbH 2011. 4 Kanal Leistungsme\u00dfger\u00e4t LMG450 Benutzerhandbuch. ZES ZIMMER Electronic Systems GmbH Tabaksm\u00fchlenweg 30 61440 Oberursel. http:\/\/www.zes.com"},{"key":"e_1_3_2_1_34_1","unstructured":"Ruiyi Zhang Taehyun Kim Daniel Weber and Michael Schwarz. 2023. (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels In USENIX Security. USENIX Security. https:\/\/publications.cispa.saarland\/3769\/"}],"event":{"name":"ICPE '25: 16th ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Toronto ON Canada","acronym":"ICPE '25"},"container-title":["Proceedings of the 16th ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676151.3719370","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676151.3719370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:23:44Z","timestamp":1758817424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676151.3719370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":34,"alternative-id":["10.1145\/3676151.3719370","10.1145\/3676151"],"URL":"https:\/\/doi.org\/10.1145\/3676151.3719370","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"2025-05-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}