{"id":"https://openalex.org/W4404133331","doi":"https://doi.org/10.1145/3649329.3656531","title":"Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems","display_name":"Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems","publication_year":2024,"publication_date":"2024-06-23","ids":{"openalex":"https://openalex.org/W4404133331","doi":"https://doi.org/10.1145/3649329.3656531"},"language":"en","primary_location":{"id":"doi:10.1145/3649329.3656531","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649329.3656531","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 61st ACM/IEEE Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3649329.3656531","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076844961","display_name":"Nikhil Chawla","orcid":"https://orcid.org/0000-0003-3454-6135"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nikhil Chawla","raw_affiliation_strings":["Intel Corp., Hillsboro, OR, United States"],"raw_orcid":"https://orcid.org/0000-0003-3454-6135","affiliations":[{"raw_affiliation_string":"Intel Corp., Hillsboro, OR, United States","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322194","display_name":"Chen Liu","orcid":"https://orcid.org/0000-0003-0763-2003"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen Liu","raw_affiliation_strings":["Intel Corp., Hillsboro, OR, United States"],"raw_orcid":"https://orcid.org/0000-0003-0763-2003","affiliations":[{"raw_affiliation_string":"Intel Corp., Hillsboro, OR, United States","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102743445","display_name":"Abhishek Chakraborty","orcid":"https://orcid.org/0000-0003-2948-6326"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhishek Chakraborty","raw_affiliation_strings":["Intel Corp., Hillsboro, OR, United States"],"raw_orcid":"https://orcid.org/0000-0003-2948-6326","affiliations":[{"raw_affiliation_string":"Intel Corp., Hillsboro, OR, United States","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092362957","display_name":"Igor Chervatyuk","orcid":"https://orcid.org/0009-0009-1976-256X"},"institutions":[{"id":"https://openalex.org/I131781684","display_name":"Intel (Ireland)","ror":"https://ror.org/02r5scg33","country_code":"IE","type":"company","lineage":["https://openalex.org/I131781684","https://openalex.org/I1343180700"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Igor Chervatyuk","raw_affiliation_strings":["Intel Corp., Dublin, Ireland"],"raw_orcid":"https://orcid.org/0009-0009-1976-256X","affiliations":[{"raw_affiliation_string":"Intel Corp., Dublin, Ireland","institution_ids":["https://openalex.org/I131781684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114062713","display_name":"T. Hamasaki","orcid":"https://orcid.org/0009-0003-3610-8494"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thais Moreira Hamasaki","raw_affiliation_strings":["Intel Corp., Seattle, WA, United States"],"raw_orcid":"https://orcid.org/0009-0003-3610-8494","affiliations":[{"raw_affiliation_string":"Intel Corp., Seattle, WA, United States","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101540341","display_name":"Ke Zhen Sun","orcid":"https://orcid.org/0009-0008-9663-5081"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ke Sun","raw_affiliation_strings":["Intel Corp., Hillsboro, OR, United States"],"raw_orcid":"https://orcid.org/0009-0008-9663-5081","affiliations":[{"raw_affiliation_string":"Intel Corp., Hillsboro, OR, United States","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010636141","display_name":"Henrique Kawakami","orcid":"https://orcid.org/0000-0003-0597-2784"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Henrique Kawakami","raw_affiliation_strings":["Intel Corp., Seatlle, WA, United States"],"raw_orcid":"https://orcid.org/0000-0003-0597-2784","affiliations":[{"raw_affiliation_string":"Intel Corp., Seatlle, WA, United States","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5076844961"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":0.3288,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56518051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7949231266975403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6255844235420227},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5415658354759216},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.49619346857070923},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4679027497768402},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34545236825942993},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3146694600582123},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2816101014614105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20934417843818665},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.18258202075958252},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08831286430358887}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7949231266975403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6255844235420227},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5415658354759216},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.49619346857070923},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4679027497768402},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34545236825942993},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3146694600582123},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2816101014614105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20934417843818665},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.18258202075958252},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08831286430358887},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3649329.3656531","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649329.3656531","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 61st ACM/IEEE Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3649329.3656531","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649329.3656531","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 61st ACM/IEEE Design Automation Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W3016859066","https://openalex.org/W5280335","https://openalex.org/W4200321003","https://openalex.org/W4400339423","https://openalex.org/W3215861253","https://openalex.org/W4252980856","https://openalex.org/W4200163172"],"abstract_inverted_index":{"Traditionally,":[0],"power":[1,19,33,45,59,87,100,113,171,188],"side-channel":[2,46,60,159],"analysis":[3],"requires":[4],"physical":[5,49],"access":[6,83],"to":[7,16,37,84,93],"the":[8,18,72,85,109,112,116,153,167,174,179],"target":[9],"device,":[10],"as":[11,13],"well":[12],"specialized":[14],"devices":[15],"measure":[17],"consumption":[20,101,114],"with":[21],"enough":[22],"precision.":[23],"Recently":[24],"research":[25],"has":[26],"shown":[27],"that":[28,56],"on":[29,65,161],"x86":[30],"platforms,":[31],"on-chip":[32,86,187],"meter":[34],"capabilities":[35],"exposed":[36],"a":[38,90,138,143],"software":[39,91,183],"interface":[40,92],"might":[41],"be":[42],"used":[43],"for":[44,185],"attacks":[47],"without":[48],"access.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54,165],"show":[55],"such":[57,104],"software-based":[58,170],"attack":[61,160],"is":[62],"also":[63,121,151],"applicable":[64],"Apple":[66,162],"silicon":[67],"(e.g.,":[68],"M1/M2":[69],"platforms),":[70],"exploiting":[71],"System":[73],"Management":[74],"Controller":[75],"(SMC)":[76],"and":[77,107,115,178],"its":[78],"power-related":[79],"keys,":[80],"which":[81],"provides":[82],"meters":[88],"through":[89],"user":[94,126],"space":[95],"software.":[96],"We":[97,149],"observed":[98],"data-dependent":[99],"reporting":[102],"from":[103,132,137],"SMC":[105],"keys":[106],"analyzed":[108],"correlations":[110],"between":[111],"processed":[117],"data.":[118],"Our":[119],"work":[120],"demonstrated":[122],"how":[123],"an":[124,133],"unprivileged":[125],"mode":[127,145],"application":[128],"successfully":[129],"recovers":[130],"bytes":[131],"AES":[134],"encryption":[135],"key":[136],"cryptographic":[139],"service":[140],"supported":[141],"by":[142],"kernel":[144],"driver":[146],"in":[147,173],"MacOS.":[148],"have":[150],"studied":[152],"feasibility":[154],"of":[155,169,182],"performing":[156],"frequency":[157],"throttling":[158],"silicon.":[163],"Furthermore,":[164],"discuss":[166],"impact":[168],"side-channels":[172],"industry,":[175],"possible":[176],"countermeasures,":[177],"overall":[180],"implications":[181],"interfaces":[184],"modern":[186],"management":[189],"systems.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
