{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:36Z","timestamp":1755225216106,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"publisher","award":["No. UG233015TD"],"award-info":[{"award-number":["No. UG233015TD"]}],"id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3710815","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"1158-1174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ProbeShooter: A New Practical Approach for Probe Aiming"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5523-6710","authenticated-orcid":false,"given":"Daehyeon","family":"Bae","sequence":"first","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6594-732X","authenticated-orcid":false,"given":"Sujin","family":"Park","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3976-5862","authenticated-orcid":false,"given":"Minsig","family":"Choi","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6062-7417","authenticated-orcid":false,"given":"Young-Giu","family":"Jung","sequence":"additional","affiliation":[{"name":"YM-NaeulTech., Incheon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3031-6626","authenticated-orcid":false,"given":"Changmin","family":"Jeong","sequence":"additional","affiliation":[{"name":"Agency for Defense Development, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8137-4810","authenticated-orcid":false,"given":"Heeseok","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University, Sejong, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7506-4023","authenticated-orcid":false,"given":"Seokhie","family":"Hong","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34618-8_10"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133318"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Jakub Breier and Xiaolu Hou. 2022. How Practical Are Fault Injection Attacks Really? IEEE Access 10 (2022) 113122\u2013113130. 10.1109\/ACCESS.2022.3217212","DOI":"10.1109\/ACCESS.2022.3217212"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750394"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Josef Danial Debayan Das Santosh Ghosh Arijit Raychowdhury and Shreyas Sen. 2020. SCNIFFER: Low-Cost Automated Efficient Electromagnetic Side-Channel Sniffing. IEEE Access 8 (2020) 173414\u2013173427. 10.1109\/ACCESS.2020.3025022","DOI":"10.1109\/ACCESS.2020.3025022"},{"key":"e_1_3_3_1_10_2","series-title":"(USENIX Security '23)","first-page":"6293","volume-title":"32nd USENIX Security Symposium","author":"De\u00a0Meulemeester Jesse","year":"2023","unstructured":"Jesse De\u00a0Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, and Ingrid Verbauwhede. 2023. SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution. In 32nd USENIX Security Symposium (Anaheim, CA, USA) (USENIX Security '23). USENIX Association, Berkeley, CA, USA, 6293\u20136310."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530437"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_17"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Bo Hou Rui Ding Weiheng Shao Siyang Liu and Liwei Wang. 2024. Pattern clustering method of magnetic near-field radiation emissions based on DBSCAN algorithm. IET Science Measurement & Technology (2024) 14. 10.1049\/smt2.12182","DOI":"10.1049\/smt2.12182"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Vishnuvardhan\u00a0V. Iyer and Ali\u00a0E. Y\u0131lmaz. 2022. An ANOVA Method to Rapidly Assess Information Leakage Near Cryptographic Modules. IEEE Transactions on Electromagnetic Compatibility 64 4 (2022) 915\u2013929. 10.1109\/TEMC.2022.3157664","DOI":"10.1109\/TEMC.2022.3157664"},{"key":"e_1_3_3_1_16_2","unstructured":"Minmin Jiang. 2023. Analysis and Mitigation of EM Side-Channel Attacks on Chip-to-Chip Interconnects. Ph.\u00a0D. Dissertation. University of Manchester UK."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_14"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_3_1_19_2","unstructured":"kokke. 2024. tiny-AES-c. https:\/\/github.com\/kokke\/tiny-AES-c [Accessed: Aug. 2024]."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203769"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Hyeokdong Kwon Hyunjun Kim Siwoo Eum Minjoo Sim Hyunji Kim Wai-Kong Lee Zhi Hu and Hwajeong Seo. 2022. Optimized Implementation of SM4 on AVR Microcontrollers RISC-V Processors and ARM Processors. IEEE Access 10 (2022) 80225\u201380233. 10.1109\/ACCESS.2022.3195217","DOI":"10.1109\/ACCESS.2022.3195217"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_31"},{"key":"e_1_3_3_1_23_2","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","year":"2008","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol.\u00a031. Springer Science & Business Media, New York, NY, USA."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623092"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97348-3_3"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Ryan Roemer Erik Buchanan Hovav Shacham and Stefan Savage. 2012. Return-Oriented Programming: Systems Languages and Applications. ACM Trans. Inf. Syst. Secur. 15 1 Article 2 (2012) 34\u00a0pages. 10.1145\/2133375.2133377","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Asanka Sayakkara Nhien-An Le-Khac and Mark Scanlon. 2019. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digital Investigation 29 (2019) 43\u201354. 10.1016\/j.diin.2019.03.002","DOI":"10.1016\/j.diin.2019.03.002"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"Asanka\u00a0P. Sayakkara and Nhien-An Le-Khac. 2021. Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges Framework and Datasets. IEEE Access 9 (2021) 113585\u2013113598. 10.1109\/ACCESS.2021.3104525","DOI":"10.1109\/ACCESS.2021.3104525"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Nader Sehatbakhsh Alireza Nazari Monjur Alam Frank Werner Yuanda Zhu Alenka Zajic and Milos Prvulovic. 2020. REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals. IEEE Trans. Comput. 69 3 (2020) 312\u2013326. 10.1109\/TC.2019.2945767","DOI":"10.1109\/TC.2019.2945767"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Carlton Shepherd Konstantinos Markantonakis Nico van Heijningen Driss Aboulkassimi Cl\u00e9ment Gaine Thibaut Heckmann and David Naccache. 2021. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Computers & Security 111 (2021) 102471. 10.1016\/j.cose.2021.102471","DOI":"10.1016\/j.cose.2021.102471"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_10"},{"key":"e_1_3_3_1_34_2","unstructured":"NewAE Tech.2022. ChipWhisperer CW308 Targets. https:\/\/github.com\/newaetech\/chipwhisperer-target-cw308t [Accessed: Aug. 2024]."},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359571"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Frank Werner Derrick\u00a0Albert Chu Antonije\u00a0R. Djordjevi\u0107 Dragan\u00a0I. Ol\u0107an Milos Prvulovic and Alenka Zaji\u0107. 2018. A Method for Efficient Localization of Magnetic Field Sources Excited by Execution of Instructions in a Processor. IEEE Transactions on Electromagnetic Compatibility 60 3 (2018) 613\u2013622. 10.1109\/TEMC.2017.2742501","DOI":"10.1109\/TEMC.2017.2742501"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Frank\u00a0T. Werner Jelena Dinki\u0107 Dragan Ol\u0107an Antonije Djordjevi\u0107 Milos Prvulovi\u0107 and Alenka Zaji\u0107. 2021. An Efficient Method for Localization of Magnetic Field Sources That Produce High-Frequency Side-Channel Emanations. IEEE Transactions on Electromagnetic Compatibility 63 6 (2021) 1799\u20131811. 10.1109\/TEMC.2021.3063657","DOI":"10.1109\/TEMC.2021.3063657"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Alenka Zaji\u0107 and Milos Prvulovic. 2014. Experimental Demonstration of Electromagnetic Information Leakage From Modern Processor-Memory Systems. IEEE Transactions on Electromagnetic Compatibility 56 4 (2014) 885\u2013893. 10.1109\/TEMC.2014.2300139","DOI":"10.1109\/TEMC.2014.2300139"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3710815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:25:41Z","timestamp":1755069941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3710815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":37,"alternative-id":["10.1145\/3708821.3710815","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3710815","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}