{"id":"https://openalex.org/W4414197566","doi":"https://doi.org/10.1109/dac63849.2025.11132941","title":"\u201cOOPS!\u201d: Out-Of-Band Remote Power Side-Channel Attacks on Intel SGX and TDX","display_name":"\u201cOOPS!\u201d: Out-Of-Band Remote Power Side-Channel Attacks on Intel SGX and TDX","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4414197566","doi":"https://doi.org/10.1109/dac63849.2025.11132941"},"language":"en","primary_location":{"id":"doi:10.1109/dac63849.2025.11132941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11132941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057350474","display_name":"Nimish Mishra","orcid":"https://orcid.org/0000-0002-8585-9425"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nimish Mishra","raw_affiliation_strings":["Indian Institute of Technology,Kharagpur"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088197633","display_name":"Kislay Arya","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kislay Arya","raw_affiliation_strings":["Indian Institute of Technology,Kharagpur"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101816833","display_name":"Sarani Bhattacharya","orcid":"https://orcid.org/0000-0002-4190-2671"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarani Bhattacharya","raw_affiliation_strings":["Indian Institute of Technology,Kharagpur"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Paritosh Saxena","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paritosh Saxena","raw_affiliation_strings":["Intel Corporation,USA"],"affiliations":[{"raw_affiliation_string":"Intel Corporation,USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Indian Institute of Technology,Kharagpur"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057350474"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25618047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.3952000141143799},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.3700000047683716},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3601999878883362},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.353300005197525},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.3303999900817871},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.3296999931335449},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3280999958515167},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.3122999966144562}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8446999788284302},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5924999713897705},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3824999928474426},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.3700000047683716},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3601999878883362},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.353300005197525},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3303999900817871},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3280999958515167},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.30790001153945923},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2847000062465668},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26980000734329224},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac63849.2025.11132941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11132941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2741866430","https://openalex.org/W3153001680","https://openalex.org/W4282968709","https://openalex.org/W4323320229","https://openalex.org/W4399396308"],"related_works":[],"abstract_inverted_index":{"Prior":[0,204],"work":[1,221],"shows":[2],"that":[3,38,56,119,233],"remote":[4,134],"power":[5,48,135],"attacks":[6,216],"on":[7,137,143,210,215],"Intel":[8,23,68,138,144,183,198],"processors":[9],"are":[10,124],"possible":[11,62],"through":[12,122,170],"two":[13],"Model":[14],"Specific":[15],"Registers":[16],"(MSRs):":[17],"MSR_PKG_Energy_Status":[18],"and":[19,117,140,239,249],"MSR_PPO_Energy_Status.":[20],"In":[21,51],"response,":[22],"introduced":[24],"a":[25,27,150],"defense:":[26],"bit":[28],"in":[29],"MSR":[30],"IA32_MISC_PACKAGE_CTLS":[31],"allows":[32,108],"users":[33],"to":[34,42,45,111,153,173,205,242],"enable/disable":[35],"\u201cfiltering\u201d":[36,57],"mechanism":[37,152],"adds":[39],"additional":[40],"noise":[41],"energy":[43,85,120,168],"measurements":[44,159],"harden":[46],"against":[47,230],"side-channel":[49],"attacks.":[50],"this":[52],"work,":[53,207],"we":[54,89,132,190],"demonstrate":[55],"does":[58],"not":[59],"cover":[60],"all":[61],"avenues":[63],"of":[64,128,225,236],"measuring":[65],"power.":[66],"On":[67],"server-grade":[69],"platforms,":[70],"components":[71],"like":[72,83],"out-of-band":[73,158,240,250],"management":[74],"interface":[75],"(OOB)":[76],"exist":[77],"which":[78,97],"also":[79,191],"expose":[80],"telemetric":[81],"information":[82],"inband":[84],"consumption.":[86],"For":[87],"this,":[88,131],"first":[90,148],"reverse":[91],"engineer":[92],"the":[93,112,126,208,223],"protocol":[94],"structure":[95],"over":[96],"OOB":[98,107,171],"communicates":[99],"with":[100,157],"in-band":[101,155,182,197,218,238,248],"components.":[102],"We":[103,147,165],"then":[104,166],"show":[105],"how":[106],"read-only":[109],"access":[110],"Package":[113],"Configuration":[114],"Space":[115],"(PCS)":[116],"note":[118],"readings":[121,169],"PCS":[123,172],"outside":[125],"scope":[127],"filtering.":[129],"Using":[130],"establish":[133],"side-channels":[136,211],"SGX":[139,184],"TDX":[141,199],"operational":[142,180],"Sapphire":[145],"Rapids.":[146],"construct":[149],"synchronization":[151],"align":[154],"execution":[156],"by":[160],"leveraging":[161,217],"deliberately":[162],"disabled":[163],"MSRs.":[164],"use":[167],"recover":[174],"2048-bit":[175],"RSA":[176],"keys":[177,194],"from":[178,195],"MbedTLS":[179],"within":[181,196],"(with":[185],"generic":[186],"single-stepping":[187],"assumption).":[188,203],"Finally,":[189],"leak":[192],"AESNI":[193],"(without":[200],"any":[201],"single-step":[202],"our":[206],"literature":[209],"has":[212],"been":[213],"focused":[214],"interfaces.":[219],"Our":[220],"establishes":[222],"importance":[224],"evaluating":[226],"confidential":[227],"computing":[228],"architectures":[229],"attack":[231],"vectors":[232],"combine":[234],"abilities":[235],"both":[237,247],"interfaces":[241,251],"achieve":[243],"adversarial":[244],"objectives":[245],"(that":[246],"cannot":[252],"independently":[253],"achieve).":[254]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
