{"id":"https://openalex.org/W4376456917","doi":"https://doi.org/10.1109/mm.2023.3274619","title":"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86","display_name":"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4376456917","doi":"https://doi.org/10.1109/mm.2023.3274619"},"language":"en","primary_location":{"id":"doi:10.1109/mm.2023.3274619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mm.2023.3274619","pdf_url":null,"source":{"id":"https://openalex.org/S59697426","display_name":"IEEE Micro","issn_l":"0272-1732","issn":["0272-1732","1937-4143"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Micro","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101984354","display_name":"Yingchen Wang","orcid":"https://orcid.org/0009-0009-4140-307X"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yingchen Wang","raw_affiliation_strings":["The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032883022","display_name":"Riccardo Paccagnella","orcid":"https://orcid.org/0000-0002-9552-8216"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Riccardo Paccagnella","raw_affiliation_strings":["University of Illinois Urbana-Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112914838","display_name":"Elizabeth Tang He","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elizabeth Tang He","raw_affiliation_strings":["University of Illinois Urbana-Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006975767","display_name":"Hovav Shacham","orcid":"https://orcid.org/0009-0008-0225-8714"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hovav Shacham","raw_affiliation_strings":["The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027987862","display_name":"Christopher W. Fletcher","orcid":"https://orcid.org/0000-0002-9995-5995"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher W. Fletcher","raw_affiliation_strings":["University of Illinois Urbana-Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019838475","display_name":"David Kohlbrenner","orcid":"https://orcid.org/0009-0000-9121-9734"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Kohlbrenner","raw_affiliation_strings":["University of Washington, Seattle, WA, USA"],"affiliations":[{"raw_affiliation_string":"University of Washington, Seattle, WA, USA","institution_ids":["https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101984354"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":6.0707,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.97103819,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"43","issue":"4","first_page":"19","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8823854923248291},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.8611874580383301},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8175376653671265},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5479474067687988},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.527561366558075},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5174061059951782},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.49937987327575684},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4947778582572937},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3188937306404114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3159826695919037},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19447150826454163}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8823854923248291},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.8611874580383301},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8175376653671265},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5479474067687988},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.527561366558075},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5174061059951782},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49937987327575684},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4947778582572937},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3188937306404114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3159826695919037},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19447150826454163}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mm.2023.3274619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mm.2023.3274619","pdf_url":null,"source":{"id":"https://openalex.org/S59697426","display_name":"IEEE Micro","issn_l":"0272-1732","issn":["0272-1732","1937-4143"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Micro","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1607006990","https://openalex.org/W1613874182","https://openalex.org/W2154909745","https://openalex.org/W3153001680","https://openalex.org/W4293077536","https://openalex.org/W4365934498","https://openalex.org/W4376456917","https://openalex.org/W4385080326","https://openalex.org/W6854249833"],"related_works":["https://openalex.org/W182679101","https://openalex.org/W1971956962","https://openalex.org/W1968560271","https://openalex.org/W2081998479","https://openalex.org/W2043669269","https://openalex.org/W4384807855","https://openalex.org/W1533979697","https://openalex.org/W2127307719","https://openalex.org/W4376456917","https://openalex.org/W2981727040"],"abstract_inverted_index":{"Power":[0],"side-channel":[1,24],"attacks":[2,25,31],"exploit":[3],"data-dependent":[4],"variations":[5],"in":[6,112],"a":[7,75,96,108,113,124],"CPU\u2019s":[8],"power":[9,23,40,62],"consumption":[10,63],"to":[11,38,78],"leak":[12],"secrets.":[13],"In":[14],"this":[15,70],"article,":[16],"we":[17,85,122],"show":[18],"that":[19,32,69,103,136],"on":[20,59,95],"modern":[21,55,97],"CPUs,":[22],"can":[26,33,115],"be":[27,34,116],"turned":[28],"into":[29],"timing":[30],"mounted":[35],"without":[36],"access":[37],"any":[39],"measurement":[41],"interface.":[42],"This":[43],"discovery":[44],"exploits":[45],"how,":[46],"under":[47],"certain":[48],"circumstances,":[49],"the":[50,60,79,88],"dynamic":[51],"frequency":[52,94,119],"scaling":[53],"of":[54,81],"x86":[56,98],"CPU":[57],"depends":[58],"current":[61],"(and":[64],"hence,":[65],"data).":[66],"We":[67],"demonstrate":[68],"\u201cfrequency":[71],"side":[72],"channel\u201d":[73],"is":[74],"real":[76],"threat":[77],"security":[80],"cryptographic":[82],"software.":[83],"First,":[84],"reverse":[86],"engineer":[87],"dependency":[89],"between":[90],"data,":[91],"power,":[92],"and":[93],"CPU\u2014finding,":[99],"among":[100],"other":[101],"things,":[102],"differences":[104],"as":[105,107],"small":[106],"set":[109],"bit\u2019s":[110],"position":[111],"word":[114],"distinguished":[117],"through":[118],"changes.":[120],"Second,":[121],"describe":[123],"novel":[125],"chosen-ciphertext":[126],"attack":[127],"against":[128],"(constant-time":[129],"implementations":[130],"of)":[131],"supersingular":[132],"isogeny":[133],"key":[134,139],"encapsulation":[135],"allows":[137],"full":[138],"extraction":[140],"via":[141],"remote":[142],"timing.":[143]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
