{"id":"https://openalex.org/W3163520769","doi":"https://doi.org/10.1145/3409334.3452071","title":"An empirical study of thermal attacks on edge platforms","display_name":"An empirical study of thermal attacks on edge platforms","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3163520769","doi":"https://doi.org/10.1145/3409334.3452071","mag":"3163520769"},"language":"en","primary_location":{"id":"doi:10.1145/3409334.3452071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3409334.3452071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Southeast Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014721365","display_name":"Justin Duchatellier","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin Duchatellier","raw_affiliation_strings":["Kennesaw State University"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066907748","display_name":"Tyler Holmes","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tyler Holmes","raw_affiliation_strings":["Kennesaw State University"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054721271","display_name":"Kun Suo","orcid":"https://orcid.org/0000-0001-8562-0492"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kun Suo","raw_affiliation_strings":["Kennesaw State University"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102950309","display_name":"Yong Shi","orcid":"https://orcid.org/0000-0003-0895-9868"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yong Shi","raw_affiliation_strings":["Kennesaw State University"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014721365"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":0.636,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70198886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"175","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7791679501533508},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.7316553592681885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6082977652549744},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5949353575706482},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.570572018623352},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5553770661354065},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5428232550621033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47859713435173035},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.43024155497550964},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35559195280075073},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25093358755111694},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13645803928375244},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11099430918693542}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7791679501533508},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.7316553592681885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6082977652549744},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5949353575706482},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.570572018623352},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5553770661354065},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5428232550621033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47859713435173035},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.43024155497550964},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35559195280075073},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25093358755111694},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13645803928375244},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11099430918693542},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3409334.3452071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3409334.3452071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Southeast Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1608475339","https://openalex.org/W2011734610","https://openalex.org/W2048266589","https://openalex.org/W2067523571","https://openalex.org/W2080017588","https://openalex.org/W2082011829","https://openalex.org/W2086574394","https://openalex.org/W2088692353","https://openalex.org/W2101788345","https://openalex.org/W2116129931","https://openalex.org/W2120047635","https://openalex.org/W2136397315","https://openalex.org/W2144907978","https://openalex.org/W2150516182","https://openalex.org/W2344423009","https://openalex.org/W2400861403","https://openalex.org/W2565851976","https://openalex.org/W2621533430","https://openalex.org/W2757578848","https://openalex.org/W2790466674","https://openalex.org/W2791130372","https://openalex.org/W2808646753","https://openalex.org/W2915743430","https://openalex.org/W2953223508","https://openalex.org/W3140484331","https://openalex.org/W4210842697","https://openalex.org/W4297938497"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313526662","https://openalex.org/W4312996489","https://openalex.org/W3111395152","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435","https://openalex.org/W4313463379","https://openalex.org/W3214037210"],"abstract_inverted_index":{"Cloud-edge":[0],"systems":[1,75,154],"are":[2],"vulnerable":[3],"to":[4,27,54,93,119,142,163,166],"thermal":[5,29,66,95,156],"attacks":[6,67,96,162],"as":[7,173,175],"the":[8,43,55,105,121,130,144,150,158,161,168,176],"increased":[9,44],"energy":[10],"consumption":[11],"may":[12],"remain":[13],"undetected,":[14],"while":[15],"occurring":[16],"alongside":[17],"normal,":[18],"CPU-intensive":[19,91],"applications.":[20],"The":[21,123,135],"purpose":[22],"of":[23,138,152,170,178],"our":[24,81,139],"research":[25,61,71,140],"is":[26,40,68,141],"study":[28],"effects":[30,125],"on":[31,62,73,97,116],"modern":[32],"edge":[33,78,171],"systems.":[34,99],"We":[35,50,100],"also":[36],"analyze":[37],"how":[38],"performance":[39],"affected":[41],"from":[42,155],"heat":[45],"and":[46,65,89,109,132,147],"identify":[47],"preventative":[48],"measures.":[49],"speculate":[51],"that":[52],"due":[53],"technology":[56],"being":[57],"a":[58,85,90,112],"recent":[59],"innovation,":[60],"cloud-edge":[63,98,153],"devices":[64,172],"scarce.":[69],"Other":[70],"focuses":[72],"server":[74],"rather":[76],"than":[77],"platforms.":[79],"In":[80],"paper,":[82],"we":[83],"use":[84],"Raspberry":[86,106],"Pi":[87,107],"4":[88,108],"application":[92],"represent":[94],"performed":[101],"several":[102],"experiments":[103],"with":[104],"used":[110],"stress-ng,":[111],"benchmarking":[113],"tool":[114],"available":[115],"Linux":[117],"distributions,":[118],"simulate":[120],"attacks.":[122,180],"resulting":[124],"displayed":[126],"drastic":[127],"increases":[128],"in":[129],"temperature":[131],"power":[133],"consumption.":[134],"key":[136],"impact":[137],"highlight":[143],"following":[145],"risks":[146],"mitigation":[148],"plans:":[149],"vulnerability":[151],"attacks,":[157],"capability":[159],"for":[160],"go":[164],"unnoticed,":[165],"further":[167],"understanding":[169],"well":[174],"prevention":[177],"these":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
