{"id":"https://openalex.org/W4414198386","doi":"https://doi.org/10.1109/dac63849.2025.11133021","title":"ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer","display_name":"ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4414198386","doi":"https://doi.org/10.1109/dac63849.2025.11133021"},"language":"en","primary_location":{"id":"doi:10.1109/dac63849.2025.11133021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11133021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109740085","display_name":"Junkai Liang","orcid":"https://orcid.org/0009-0003-9070-1950"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junkai Liang","raw_affiliation_strings":["Peking University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Peking University,School of Computer Science","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100327618","display_name":"Xin Zhang","orcid":"https://orcid.org/0000-0003-4185-7214"},"institutions":[{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Xin Zhang","raw_affiliation_strings":["Peking University,National Engineering Research Center for Software Engineering"],"affiliations":[{"raw_affiliation_string":"Peking University,National Engineering Research Center for Software Engineering","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670613","display_name":"Di Hu","orcid":"https://orcid.org/0000-0002-6485-7279"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Daqi Hu","raw_affiliation_strings":["Peking University,National Engineering Research Center for Software Engineering"],"affiliations":[{"raw_affiliation_string":"Peking University,National Engineering Research Center for Software Engineering","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035938543","display_name":"Qingni Shen","orcid":"https://orcid.org/0000-0002-0605-6043"},"institutions":[{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Qingni Shen","raw_affiliation_strings":["Peking University,National Engineering Research Center for Software Engineering"],"affiliations":[{"raw_affiliation_string":"Peking University,National Engineering Research Center for Software Engineering","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088688674","display_name":"Yuejian Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Yuejian Fang","raw_affiliation_strings":["Peking University,National Engineering Research Center for Software Engineering"],"affiliations":[{"raw_affiliation_string":"Peking University,National Engineering Research Center for Software Engineering","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041563693","display_name":"Zhonghai Wu","orcid":"https://orcid.org/0000-0003-1268-836X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhonghai Wu","raw_affiliation_strings":["Peking University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Peking University,School of Computer Science","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5109740085"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2311513,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9569000005722046,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9567000269889832,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7487999796867371},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6524999737739563},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.46790000796318054},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.4526999890804291},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.38940000534057617},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.38589999079704285},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.36959999799728394},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.36489999294281006}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7487999796867371},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6524999737739563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5842999815940857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4717999994754791},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.46790000796318054},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.4526999890804291},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.38589999079704285},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3779999911785126},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.36959999799728394},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.36489999294281006},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3625999987125397},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.31439998745918274},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2946999967098236},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.28859999775886536},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.2870999872684479},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2824999988079071},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.26829999685287476},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac63849.2025.11133021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11133021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W1563556756","https://openalex.org/W1976646754","https://openalex.org/W2033766329","https://openalex.org/W2188776605","https://openalex.org/W2252150191","https://openalex.org/W2489077495","https://openalex.org/W2496543269","https://openalex.org/W2814895833","https://openalex.org/W2903479401","https://openalex.org/W2962726564","https://openalex.org/W2986666149","https://openalex.org/W2990094262","https://openalex.org/W3015292646","https://openalex.org/W3015685940","https://openalex.org/W3046859417","https://openalex.org/W3095549427","https://openalex.org/W3207641784","https://openalex.org/W3213013974","https://openalex.org/W4213455517","https://openalex.org/W4245276998","https://openalex.org/W4283386839","https://openalex.org/W4308644389","https://openalex.org/W4313270705","https://openalex.org/W4384948762","https://openalex.org/W4386765014","https://openalex.org/W4392249422","https://openalex.org/W4400121246","https://openalex.org/W4404134100","https://openalex.org/W4404134145","https://openalex.org/W4411337802"],"related_works":[],"abstract_inverted_index":{"Zero-knowledge":[0],"succinct":[1],"non-interactive":[2],"arguments":[3],"of":[4],"knowledge":[5],"(zk-SNARK)":[6],"schemes":[7,17,55],"have":[8],"been":[9],"a":[10,44,91],"promising":[11],"technique":[12,82],"in":[13,61,65,95],"verified":[14],"computation.":[15],"Zk-SNARK":[16],"were":[18],"designed":[19],"to":[20,35,85],"be":[21],"mathematically":[22],"secure":[23],"against":[24],"cryptographic":[25],"attacks":[26],"and":[27,83,97],"it":[28],"remains":[29],"unclear":[30],"whether":[31],"they":[32],"are":[33],"vulnerable":[34],"fault":[36,93],"injection":[37],"attacks.":[38],"In":[39],"this":[40],"work,":[41],"we":[42,73],"provide":[43],"positive":[45],"answer":[46],"by":[47],"presenting":[48],"ZK-Hammer,":[49],"which":[50],"leaks":[51],"secrets":[52],"from":[53],"zk-SNARK":[54],"via":[56],"Rowhammer.":[57],"We":[58,89],"incur":[59],"faults":[60],"the":[62,66,75,79,87],"exponentiate":[63],"variables":[64],"Quadratic":[67],"Arithmetic":[68],"Program":[69],"(QAP)":[70],"problem.":[71],"Then":[72],"analyze":[74],"faulty":[76],"proof":[77],"using":[78],"bilinear":[80],"pairing":[81],"manage":[84],"recover":[86],"secret.":[88],"employ":[90],"Rowhammer":[92],"evaluation":[94],"libsnark":[96],"identify":[98],"3":[99],"CVEs.":[100]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
