{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:43:19Z","timestamp":1774719799580,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T00:00:00Z","timestamp":1730505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1901446"],"award-info":[{"award-number":["CCF-1901446"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,2]]},"DOI":"10.1145\/3696843.3696849","type":"proceedings-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:13:43Z","timestamp":1730229223000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SoK Paper: Power Side-Channel Malware Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4488-3238","authenticated-orcid":false,"given":"Alexander","family":"Cathis","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1075-6859","authenticated-orcid":false,"given":"Ge","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-5334","authenticated-orcid":false,"given":"Shijia","family":"Wei","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-4748","authenticated-orcid":false,"given":"Michael","family":"Orshansky","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0384-3308","authenticated-orcid":false,"given":"Mohit","family":"Tiwari","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6748-2054","authenticated-orcid":false,"given":"Andreas","family":"Gerstlauer","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,2]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2024. Power-Based Malware Detection Dataset. https:\/\/github.com\/SLAM-Lab\/PMD-Dataset."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Carlos\u00a0R Aguayo\u00a0Gonz\u00e1lez and Jeffrey\u00a0H Reed. 2011. Power Fingerprinting in SDR Integrity Assessment for Security and Regulatory Compliance. AICSP 69 2 (2011) 307\u2013327.","DOI":"10.1007\/s10470-011-9777-4"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Mohammed Almshari Georgios Tsaramirsis Adil\u00a0Omar Khadidos Seyed\u00a0Mohammed Buhari Fazal\u00a0Qudus Khan and Alaa\u00a0Omar Khadidos. 2020. Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid Using Power Consumption Data. Sensors 20 18 (2020) 5075.","DOI":"10.3390\/s20185075"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Christoph Bergmeir and Jose\u00a0M Benitez. 2012. On the Use of Cross-Validation for Time Series Predictor Evaluation. Information Sciences 191 (2012) 192\u2013213.","DOI":"10.1016\/j.ins.2011.12.028"},{"key":"e_1_3_3_1_6_2","unstructured":"James Bergstra and Yoshua Bengio. 2012. Random Search for Hyper-Parameter Optimization. JMLR 13 2 (2012) 281\u2013305."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Konstantinos\u00a0V Blazakis Theodoros\u00a0N Kapetanakis and George\u00a0S Stavrakakis. 2020. Effective Electricity Theft Detection in Power Distribution Grids Using an Adaptive Neuro Fuzzy Inference System. Energies 13 12 (2020) 3110.","DOI":"10.3390\/en13123110"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00077"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00250"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Luca Caviglione et\u00a0al. 2015. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans. Inf. Forensics Security 11 4 (2015) 799\u2013810.","DOI":"10.1109\/TIFS.2015.2510825"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Luca Caviglione Micha\u0142 Chora\u015b Igino Corona Artur Janicki Wojciech Mazurczyk Marek Pawlicki and Katarzyna Wasielewska. 2020. Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9 (2020) 5371\u20135396.","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_3_1_12_2","volume-title":"HealthTech","author":"Clark Shane\u00a0S","year":"2013","unstructured":"Shane\u00a0S Clark et\u00a0al. 2013. Wattsupdoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. In HealthTech. Washington D.C."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323953"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.45"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415692"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Anupam Golder Debayan Das Josef Danial Santosh Ghosh Shreyas Sen and Arijit Raychowdhury. 2019. Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack. IEEE TVLSI 27 12 (2019) 2720\u20132733.","DOI":"10.1109\/TVLSI.2019.2926324"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.352"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460041"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_18"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056069"},{"key":"e_1_3_3_1_21_2","volume-title":"ATEE","author":"Ioane\u015f Andrei","year":"2019","unstructured":"Andrei Ioane\u015f and Radu Tirnovan. 2019. Power Grid Health Assessment Using Machine Learning Algorithms. In ATEE. Bucharest."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Halld\u00f3r Janetzko Florian Stoffel Sebastian Mittelst\u00e4dt and Daniel\u00a0A Keim. 2014. Anomaly Detectan for Visual Analytics of Power Consumption Data. Computers & Graphics 38 (2014) 27\u201337.","DOI":"10.1016\/j.cag.2013.10.006"},{"key":"e_1_3_3_1_23_2","volume-title":"ICDIS","author":"Jimenez Jarilyn\u00a0Hernandez","year":"2019","unstructured":"Jarilyn\u00a0Hernandez Jimenez and Katerina Goseva-Popstojanova. 2019. Malware Detection Using Power Consumption and Network Traffic Data. In ICDIS. South Padre Island."},{"key":"e_1_3_3_1_24_2","volume-title":"XKCP","author":"Team KECCAK","year":"2020","unstructured":"KECCAK Team. 2020. XKCP. XKCP. https:\/\/github.com\/XKCP\/XKCP."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Paul Kocher Jann Horn Anders Fogh Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher et\u00a0al. 2020. Spectre attacks: Exploiting speculative execution. Commun. ACM 63 7 (2020) 93\u2013101.","DOI":"10.1145\/3399742"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_3_1_28_2","volume-title":"ARES","author":"Lalande Jean-Francois","year":"2013","unstructured":"Jean-Francois Lalande and Steffen Wendzel. 2013. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ARES. Regensburg."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Moritz Lipp Michael Schwarz Daniel Gruss Thomas Prescher Werner Haas Jann Horn Stefan Mangard Paul Kocher Daniel Genkin Yuval Yarom et\u00a0al. 2020. Meltdown: Reading kernel memory from user space. Commun. ACM 63 6 (2020) 46\u201356.","DOI":"10.1145\/3357033"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Patrick Luckett J\u00a0Todd McDonald William\u00a0B Glisson Ryan Benton Joel Dawson and Blair\u00a0A Doyle. 2018. Identifying Stealth Malware Using CPU Power Consumption and Learning Algorithms. Journal of Computer Security 26 5 (2018) 589\u2013613.","DOI":"10.3233\/JCS-171060"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Valentino Merlino and Dario Allegra. 2024. Energy-based approach for attack detection in IoT devices: A survey. Internet of Things 27 2024 (2024) 101306.","DOI":"10.1016\/j.iot.2024.101306"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383884"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_3_1_36_2","volume-title":"MITRE ATT&CK: Design and Philosophy","author":"Strom Blake\u00a0E","year":"2018","unstructured":"Blake\u00a0E Strom, Andy Applebaum, Doug\u00a0P Miller, Kathryn\u00a0C Nickels, Adam\u00a0G Pennington, and Cody\u00a0B Thomas. 2018. MITRE ATT&CK: Design and Philosophy. Technical Report. MITRE."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Jin Wang Ping Liu Mary\u00a0FH She Saeid Nahavandi and Abbas Kouzani. 2013. Bag-Of-Words Representation for Biomedical Time Series Classification. Biomed. Signal Process. Control. 8 6 (2013) 634\u2013644.","DOI":"10.1016\/j.bspc.2013.06.004"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Xinlin Wang Insoon Yang and Sung-Hoon Ahn. 2019. Sample Efficient Home Power Anomaly Detection in Real Time Using Semi-Supervised Learning. IEEE Access 7 (2019) 139712\u2013139725.","DOI":"10.1109\/ACCESS.2019.2943667"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2311329"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740838"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981881"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Renjie Wu and Eamonn\u00a0J Keogh. 2021. Current Time Series Anomaly Detection Benchmarks Are Flawed and Are Creating the Illusion of Progress. IEEE TKDE 35 3 (2021) 2421\u20132429.","DOI":"10.1109\/TKDE.2021.3112126"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Guoming Zhang Xiaoyu Ji Yanjie Li and Wenyuan Xu. 2020. Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20 13 (2020) 3635.","DOI":"10.3390\/s20133635"},{"key":"e_1_3_3_1_44_2","volume-title":"SP","author":"Zhang Zhenkai","year":"2018","unstructured":"Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Bo Li, Peter Volgyesi, and Xenofon Koutsoukos. 2018. Leveraging Em Side-Channel Information to Detect Rowhammer Attacks. In SP. San Francisco."}],"event":{"name":"HASP '24: International Workshop on Hardware and Architectural Support for Security and Privacy 2024","location":"Austin TX USA","acronym":"HASP '24"},"container-title":["Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696843.3696849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696843.3696849","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696843.3696849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:45Z","timestamp":1750294665000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696843.3696849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,2]]},"references-count":43,"alternative-id":["10.1145\/3696843.3696849","10.1145\/3696843"],"URL":"https:\/\/doi.org\/10.1145\/3696843.3696849","relation":{},"subject":[],"published":{"date-parts":[[2024,11,2]]},"assertion":[{"value":"2024-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}