{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:29:23Z","timestamp":1766068163047,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,6]]},"DOI":"10.1145\/3715014.3724040","type":"proceedings-article","created":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T23:37:21Z","timestamp":1746401841000},"page":"626-627","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster Abstract: Time Attacks using Kernel Vulnerabilities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1751-4552","authenticated-orcid":false,"given":"Muhammad Abdullah","family":"Soomro","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7604-6978","authenticated-orcid":false,"given":"Adeel","family":"Nasrullah","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7119-7232","authenticated-orcid":false,"given":"Fatima","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS46320.2019.00018"},{"key":"e_1_3_2_1_2_1","volume-title":"Triad: Trusted Times-tamps in Untrusted Environments","author":"Fernandez Gabriel","year":"2023","unstructured":"Gabriel Fernandez, Andrey Brito, and Christof Fetzer. 2023. Triad: Trusted Times-tamps in Untrusted Environments. In IEEE Cloud."},{"key":"e_1_3_2_1_3_1","volume-title":"Like Clockwork: A Systematic Analysis of AMD SEV-SNP's SecureTSC. Ph. D. Dissertation","author":"Juffinger Jonas","year":"2024","unstructured":"Jonas Juffinger. 2024. Like Clockwork: A Systematic Analysis of AMD SEV-SNP's SecureTSC. Ph. D. Dissertation. Graz University of Technology."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"e_1_3_2_1_5_1","volume-title":"Anwar","author":"Nasrullah Adeel","year":"2024","unstructured":"Adeel Nasrullah and Fatima M. Anwar. 2024. Trusted Timing Services with Timeguard. In IEEE RTAS."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Mattia Nicolella Shahin Roozkhosh Denis Hoornaert Andrea Bastoni and Renato Mancuso. 2022. RT-Bench: an Extensible Benchmark Framework for the Analysis and Management of Real-Time Applications. In ACM RTNS. ACM.","DOI":"10.1145\/3534879.3534888"},{"key":"e_1_3_2_1_7_1","volume-title":"Time synchronization attack in smart grid: Impact and analysis","author":"Zhang Zhenghao","year":"2013","unstructured":"Zhenghao Zhang, Shuping Gong, Aleksandar D Dimitrovski, and Husheng Li. 2013. Time synchronization attack in smart grid: Impact and analysis. IEEE Transactions on Smart Grid (2013)."}],"event":{"name":"SenSys '25: 23rd ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGOPS ACM Special Interest Group on Operating Systems","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"UC Irvine Student Center. Irvine CA USA","acronym":"SenSys '25"},"container-title":["Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3724040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:52Z","timestamp":1750298212000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3724040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":7,"alternative-id":["10.1145\/3715014.3724040","10.1145\/3715014"],"URL":"https:\/\/doi.org\/10.1145\/3715014.3724040","relation":{},"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2025-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}