{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T23:47:55Z","timestamp":1763164075687,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031209734"},{"type":"electronic","value":"9783031209741"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20974-1_9","type":"book-chapter","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T08:06:38Z","timestamp":1668067598000},"page":"188-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HyperDetector: Detecting, Isolating, and\u00a0Mitigating Timing Attacks in\u00a0Virtualized Environments"],"prefix":"10.1007","author":[{"given":"Musa Sadik","family":"Unal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8970-6178","authenticated-orcid":false,"given":"Arsalan","family":"Javeed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4124-2295","authenticated-orcid":false,"given":"Cemal","family":"Yilmaz","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Savas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 9(3), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s41635-018-0046-1","volume":"3","author":"J Szefer","year":"2019","unstructured":"Szefer, J.: Survey of microarchitectural side and covert channels, attacks, and defenses. J. Hardw. Syst. Secur. 3(3), 219\u2013234 (2019)","journal-title":"J. Hardw. Syst. Secur."},{"issue":"6","key":"9_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3134","volume":"28","author":"J Betz","year":"2017","unstructured":"Betz, J., Westhoff, D., M\u00fcller, G.: Survey on covert channels in virtual machines and cloud computing. Trans. Emerg. Telecommun. Technol. 28(6), e3134 (2017)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Atici, A.C.,\u00a0Yilmaz, C.,\u00a0Savas, E.: An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks. In: 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, pp. 74\u201383 (2013)","DOI":"10.1109\/SERE-C.2013.15"},{"key":"9_CR5","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"9_CR7","unstructured":"Percival, C.: Cache missing for fun and profit (2005)"},{"key":"9_CR8","unstructured":"Lipp, M., et al.: MeltDown: reading kernel memory from user space. In: 27th USENIX Security Symposium (USENIX Security 2018) (2018)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-319-40667-1_14","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Wagner, K., Mangard, S.: Flush+Flush: a fast and stealthy cache attack. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 279\u2013299. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_14"},{"key":"9_CR10","unstructured":"Yarom, Y., Falkner, K.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Conference on Security Symposium, ser. SEC 2014, pp. 719\u2013732. USENIX Association, USA (2014)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Liu, F.,\u00a0Yarom, Y.,\u00a0Ge, Q.,\u00a0Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: 2015 IEEE Symposium on Security and Privacy, pp. 605\u2013622. IEEE (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"9_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102454","volume":"110","author":"A Javeed","year":"2021","unstructured":"Javeed, A., Yilmaz, C., Savas, E.: Detector+: an approach for detecting, isolating, and preventing timing attacks. Comput. Secur. 110, 102454 (2021)","journal-title":"Comput. Secur."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Martin, R.,\u00a0Demme, J.,\u00a0Sethumadhavan, S.: TimeWarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. In: 2012 39th Annual International Symposium on Computer Architecture (ISCA), pp. 118\u2013129. IEEE (2012)","DOI":"10.1109\/ISCA.2012.6237011"},{"issue":"2","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2670940","volume":"17","author":"P Li","year":"2014","unstructured":"Li, P., Gao, D., Reiter, M.K.: Stopwatch: a cloud architecture for timing channel mitigation. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(2), 1\u201328 (2014)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Wu, J., Ding, L., Lin, Y., Min-Allah, N., Wang, Y.: XenPump: a new method to mitigate timing channel in cloud computing. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 678\u2013685. IEEE (2012)","DOI":"10.1109\/CLOUD.2012.28"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Moon, S.-J., Sekar, V., Reiter, M.K.: Nomad: mitigating arbitrary cloud side channels via provider-assisted migration. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1595\u20131606 (2015)","DOI":"10.1145\/2810103.2813706"},{"key":"9_CR17","unstructured":"Varadarajan, V., Ristenpart, T., Swift, M.: Scheduler-based defenses against $$\\{$$Cross-VM$$\\}$$ side-channels. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 687\u2013702 (2014)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Neiger, G., Santoni, A., Leung, F., Rodgers, D., Uhlig, R.: Intel virtualization technology: hardware support for efficient processor virtualization. Intel Technol. J. 10(3) (2006)","DOI":"10.1535\/itj.1003.01"},{"key":"9_CR19","unstructured":"The parsec benchmark suite. https:\/\/parsec.cs.princeton.edu\/"},{"key":"9_CR20","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: the linux virtual machine monitor. In: Proceedings of the Linux Symposium, Dttawa, Ontorio, Canada, vol. 1, no. 8, pp. 225\u2013230 (2007)"},{"key":"9_CR21","unstructured":"https:\/\/www.virtualbox.org\/"},{"key":"9_CR22","unstructured":"VMware workstation pro, June 2022. https:\/\/www.vmware.com\/products\/workstation-pro\/workstation-pro-evaluation.html"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01753-7","volume-title":"Hardware and Software Support for Virtualization. Synthesis Lectures on Computer Architecture","author":"E Bugnion","year":"2017","unstructured":"Bugnion, E., Nieh, J., Tsafrir, D.: Hardware and Software Support for Virtualization. Synthesis Lectures on Computer Architecture, vol. 12, pp. 1\u2013206. Springer, Cham (2017)"},{"key":"9_CR24","unstructured":"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/winternl\/ns-winternl-teb"},{"key":"9_CR25","unstructured":"IAIK: Flush + flush (2016). https:\/\/github.com\/IAIK\/flush_flush"},{"key":"9_CR26","unstructured":"IAIK: Meltdown (2018). https:\/\/github.com\/IAIK\/meltdown"},{"issue":"1","key":"9_CR27","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2017.2779824","volume":"20","author":"R Spreitzer","year":"2017","unstructured":"Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutor. 20(1), 465\u2013488 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-016-0141-6","volume":"8","author":"Q Ge","year":"2018","unstructured":"Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8(1), 1\u201327 (2018)","journal-title":"J. Cryptogr. Eng."},{"issue":"1","key":"9_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3023872","volume":"50","author":"AK Biswas","year":"2017","unstructured":"Biswas, A.K., Ghosal, D., Nagaraja, S.: A survey of timing channels and countermeasures. ACM Comput. Surv. (CSUR) 50(1), 1\u201339 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"9_CR30","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1007\/s11042-018-6281-1","volume":"78","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Gong, H., Zhang, X., Liang, C., Tan, Y.-A.: A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimedia Tools Appl. 78(3), 3493\u20133509 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Qureshi, M.K.: New attacks and defense for encrypted-address cache. In: 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA), pp. 360\u2013371. IEEE (2019)","DOI":"10.1145\/3307650.3322246"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Canella, C., et al.: Fallout: leaking data on meltdown-resistant CPUs. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 769\u2013784 (2019)","DOI":"10.1145\/3319535.3363219"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kemerlis, V.P., Sethumadhavan, S., Keromytis, A.D.: The spy in the sandbox: practical cache attacks in javascript and their implications. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1406\u20131418 (2015)","DOI":"10.1145\/2810103.2813708"},{"issue":"3\u20134","key":"9_CR34","doi-asserted-by":"publisher","first-page":"233","DOI":"10.3233\/JCS-1992-13-404","volume":"1","author":"W-M Hu","year":"1992","unstructured":"Hu, W.-M.: Reducing timing channels with fuzzy time. J. Comput. Secur. 1(3\u20134), 233\u2013254 (1992)","journal-title":"J. Comput. Secur."},{"key":"9_CR35","unstructured":"Almeida, J.B., Barbosa, M., Barthe, G., Dupressoir, F., Emmi, M.: Verifying constant-time implementations. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 53\u201370 (2016)"},{"issue":"4","key":"9_CR36","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1145\/2775054.2694372","volume":"50","author":"D Zhang","year":"2015","unstructured":"Zhang, D., Wang, Y., Suh, G.E., Myers, A.C.: A hardware design language for timing-sensitive information-flow security. ACM SIGPLAN Not. 50(4), 503\u2013516 (2015)","journal-title":"ACM SIGPLAN Not."},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Sapper: a language for hardware-level security policy enforcement. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 97\u2013112 (2014)","DOI":"10.1145\/2541940.2541947"},{"issue":"1","key":"9_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2638548","volume":"37","author":"DE Porter","year":"2014","unstructured":"Porter, D.E., Bond, M.D., Roy, I., McKinley, K.S., Witchel, E.: Practical fine-grained information flow control using laminar. ACM Trans. Program. Lang. Syst. (TOPLAS) 37(1), 1\u201351 (2014)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"issue":"1","key":"9_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2756550","volume":"18","author":"G Doychev","year":"2015","unstructured":"Doychev, G., K\u00f6pf, B., Mauborgne, L., Reineke, J.: CacheAudit: a tool for the static analysis of cache side channels. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(1), 1\u201332 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Cock, D., Ge, Q., Murray, T., Heiser, G.: The last mile: an empirical study of timing channels on seL4. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 570\u2013581 (2014)","DOI":"10.1145\/2660267.2660294"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Rodrigues, B., Quint\u00e3o Pereira, F.M., Aranha, D.F.: Sparse representation of implicit flows with applications to side-channel detection. In: Proceedings of the 25th International Conference on Compiler Construction, pp. 110\u2013120 (2016)","DOI":"10.1145\/2892208.2892230"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Barthe, G., Betarte, G., Campo, J., Luna, C., Pichardie, D.: System-level non-interference for constant-time cryptography. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1267\u20131279 (2014)","DOI":"10.1145\/2660267.2660283"},{"key":"9_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-40667-1_15","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in JavaScript. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 300\u2013321. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_15"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Nomani, J., Szefer, J.: Predicting program phases and defending against side-channel attacks using hardware performance counters. In: Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, pp. 1\u20134 (2015)","DOI":"10.1145\/2768566.2768575"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xiao, Y., Zhang, Y.: Return-oriented flush-reload side channels on arm and their implications for android devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 858\u2013870 (2016)","DOI":"10.1145\/2976749.2978360"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Andrysco, M.,\u00a0Kohlbrenner, D.,\u00a0Mowery, K.,\u00a0Jhala, R.,\u00a0Lerner, S.,\u00a0Shacham, H.: On subnormal floating point and abnormal timing. In: 2015 IEEE Symposium on Security and Privacy, pp. 623\u2013639. IEEE (2015)","DOI":"10.1109\/SP.2015.44"},{"issue":"4","key":"9_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2086696.2086714","volume":"8","author":"L Domnitser","year":"2012","unstructured":"Domnitser, L., Jaleel, A., Loew, J., Abu-Ghazaleh, N., Ponomarev, D.: Non-monopolizable caches: low-complexity mitigation of cache side channel attacks. ACM Trans. Archit. Code Optim. (TACO) 8(4), 1\u201321 (2012)","journal-title":"ACM Trans. Archit. Code Optim. (TACO)"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Kiriansky, V.,\u00a0Lebedev, I.,\u00a0Amarasinghe, S.,\u00a0Devadas, S.,\u00a0Emer, J.: DAWG: a defense against cache timing attacks in speculative execution processors. In: 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), pp. 974\u2013987. IEEE (2018)","DOI":"10.1109\/MICRO.2018.00083"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. In: Proceedings of the 34th Annual International Symposium on Computer Architecture, pp. 494\u2013505 (2007)","DOI":"10.1145\/1273440.1250723"},{"key":"9_CR50","unstructured":"Page, D.: Partitioned cache architecture as a side-channel defence mechanism. Cryptology ePrint Archive (2005)"},{"key":"9_CR51","doi-asserted-by":"crossref","unstructured":"Fletchery, C.W.,\u00a0Ren, L.,\u00a0Yu, X.,\u00a0Van\u00a0Dijk, M.,\u00a0Khan, O.,\u00a0Devadas, S.: Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs. In: 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA), pp. 13\u2013224. IEEE (2014)","DOI":"10.1109\/HPCA.2014.6835932"},{"key":"9_CR52","unstructured":"Wang, S., Wang, P., Liu, X., Zhang, D., Wu, D.: CacheD: identifying Cache-Based timing channels in production software. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 235\u2013252 (2017)"},{"key":"9_CR53","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.future.2020.05.017","volume":"112","author":"TA Akyildiz","year":"2020","unstructured":"Akyildiz, T.A., Guzgeren, C.B., Yilmaz, C., Savas, E.: MeltdownDetector: a runtime approach for detecting meltdown attacks. Futur. Gener. Comput. Syst. 112, 136\u2013147 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9_CR54","unstructured":"Kim, T., Peinado, M., Mainar-Ruiz, G.: STEALTHMEM: system-Level protection against Cache-Based side channel attacks in the cloud. In: 21st USENIX Security Symposium (USENIX Security 2012), pp. 189\u2013204 (2012)"},{"issue":"4","key":"9_CR55","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10207-018-0411-7","volume":"18","author":"Y Kulah","year":"2018","unstructured":"Kulah, Y., Dincer, B., Yilmaz, C., Savas, E.: SpyDetector: an approach for detecting side-channel attacks at runtime. Int. J. Inf. Secur. 18(4), 393\u2013422 (2018). https:\/\/doi.org\/10.1007\/s10207-018-0411-7","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR56","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1016\/j.asoc.2016.09.014","volume":"49","author":"M Chiappetta","year":"2016","unstructured":"Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. 49, 1162\u20131174 (2016)","journal-title":"Appl. Soft Comput."},{"key":"9_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Reiter, M.K.: D\u00fcppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 827\u2013838 (2013)","DOI":"10.1145\/2508859.2516741"},{"key":"9_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-30806-7_9","volume-title":"Engineering Secure Software and Systems","author":"M Payer","year":"2016","unstructured":"Payer, M.: HexPADS: a platform to detect \u201cStealth\u2019\u2019 attacks. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 138\u2013154. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_9"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20974-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:04:00Z","timestamp":1672344240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20974-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209734","9783031209741"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20974-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cans2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}