%PDF-1.5
%
1 0 obj
<>stream
application/pdfIEEEIEEE Computer Architecture Letters; ;PP;99;10.1109/LCA.2018.2860006 A New Class of Covert Channels Exploiting Power Management VulnerabilitiesS. Karen KhatamifardLongfei WangSelcuk KoseUlya Karpuzcu
IEEE Computer Architecture Letters1 99PP 10.1109/LCA.2018.28600061
endstream
endobj
2 0 obj
<>/Metadata 1 0 R/Pages 7 0 R>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>
endobj
5 0 obj
<>stream
xS(T e
endstream
endobj
6 0 obj
<>stream
xST %
endstream
endobj
7 0 obj
<>
endobj
8 0 obj
<>
endobj
9 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R]>>
endobj
10 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R]>>
endobj
11 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[69 0 R 70 0 R 71 0 R 72 0 R 73 0 R]>>
endobj
12 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[78 0 R 79 0 R 80 0 R 81 0 R 82 0 R 83 0 R 84 0 R 85 0 R 86 0 R 87 0 R 88 0 R 89 0 R 90 0 R 91 0 R 92 0 R 93 0 R 94 0 R 95 0 R 96 0 R 97 0 R 98 0 R 99 0 R 100 0 R 101 0 R]>>
endobj
28 0 obj
<>
endobj
29 0 obj
<>stream
HWYs8~WUĔID-qىgf!IHBq~ EINfU2 ěbN^7l?BvAflS-Y[g`EAl`*kL^ʖT 1L+4Jmw/؟d!dvڰێu #`ղլO܋v'١W Hwlڻ L&\PI|ayX_{AgafWie{E^Lsxߵ;Cʞ
kʌXpa&)࿋O4A7w
Tu%|:<3v:jȱNCd ?tt2gaNEZdQvo&6g z>BsW/II? _GqY/ZbfPAg?nfkN+J[G;<ym?tb;;wM@r$c1]Fc#~kKZ8,'M%D}7a>D9)Vz|m3K֮&&)3:n-|Rp?*h%H=6cڥkR'^J[lИd7n^r3dL;@sTS8蘀ʸUtKМ4гkZ)ZU;y¦pAw8ڈ)Vםi{|\B mH\E l:fƤCN-8t IckvzO\{.O;0KœF c7ӏ{UgIgs@9^(7G? 70E˂\.,8t͌7ŧſo6TJ<Ƞw4;mfbh9bl;g"s.
w401!x8t]
||fq;kZF<c7^',Mgv9}O_Rv%OY#Pq19qɉSex j b'-2'okIJ
|R3/pa'MQflƱWp'&1`ZXbc섉dWYij'QU*t*Ͷp+
&>Jc\Xu=U";#" E;%
QעsmNʞ
}0S1|왽˒2ɫ$)5ktÂN~mߴ:EolӦi:gva!Qx,1ڞIA=ychD6ra+Q'[lաӘT¾}IO8IO#$ACgvfPYrdl1
LQ,SThE,/S|aOM_qGWNAM+8\^riHF\53|OȤByabʆAY 6r1
M|/CvA+Kf%]vr]P Ѫ7rL%"ÙܮϪwP9t~`?t酚n$ i4hLC3^D1
n]d0 ,2$Tq0?ջ&do;3e )J Ly%]l~4]%kAsܿ>L_+H<^<]pwZF[B#Zit(p3zie'}D[Y~1
Ak${zLŧGwnvIK
\t}e^S$6.i#b#xQ% Z)+4sՇV&r+
JR`]w?նܸD~$x&Oމg7̥ƳIm@S1E2W>h %j`5 @w>eiu'"?@`4$B EzBtXܥ;ڷp {h}4ku(&