{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:03:47Z","timestamp":1766066627557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459301"},{"type":"electronic","value":"9783319459318"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45931-8_9","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T07:26:19Z","timestamp":1474010779000},"page":"136-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Runtime Code Polymorphism as a Protection Against Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"Damien","family":"Courouss\u00e9","sequence":"first","affiliation":[]},{"given":"Thierno","family":"Barry","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Robisson","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Jaillon","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Potin","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"issue":"8","key":"9_CR1","first-page":"1320","volume":"34","author":"G Agosta","year":"2015","unstructured":"Agosta, G., Barenghi, A., Pelosi, G., Scandale, M.: The MEET approach: Securing cryptographic embedded software against side channel attacks. IEEE TCAD 34(8), 1320\u20131333 (2015)","journal-title":"IEEE TCAD"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Agosta, G., Barenghi, A., Pelosi, G.: A code morphing methodology to automate power analysis countermeasures. In: DAC, pp. 77\u201382. ACM (2012)","DOI":"10.1145\/2228360.2228376"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Security Theory and Practice","author":"A Amarilli","year":"2011","unstructured":"Amarilli, A., M\u00fcller, S., Naccache, D., Page, D., Rauzy, P., Tunstall, M.: Can code polymorphism limit information leakage? In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 1\u201321. Springer, Heidelberg (2011)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ambrose, J., Ragel, R., Parameswaran, S.: Rijid: random code injection to mask power analysis based side channel attacks. In: DAC, pp. 489\u2013492 (2007)","DOI":"10.1145\/1278480.1278606"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Aracil, C., Courouss\u00e9, D.: Software acceleration of floating-point multiplication using runtime code generation. In: ICEAC, pp. 18\u201323 (2013)","DOI":"10.1109\/ICEAC.2013.6737630"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2086696.2086699","volume":"8","author":"AG Bayrak","year":"2012","unstructured":"Bayrak, A.G., Velickovic, N., Ienne, P., Burleson, W.: An architecture-independent instruction shuffler to protect against side-channel attacks. TACO 8(4), 1\u201319 (2012)","journal-title":"TACO"},{"key":"9_CR7","unstructured":"Boulet, F., Barthe, M., Le, T.H.: Protection of applets against hidden-channel analysis, WO\/2012\/085482 (2013)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-642-54807-9_6","volume-title":"CC 2014","author":"HP Charles","year":"2014","unstructured":"Charles, H.P., Courouss\u00e9, D., Lomller, V., Endo, F., Gauguey, R.: $$\\mathtt{{deGoal}}$$ a tool to embed dynamic code generators into applications. In: Cohen, A. (ed.) CC 2014. LNCS, vol. 8409, pp. 107\u2013112. Springer, Heidelberg (2014)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-15031-9_7","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J-S Coron","year":"2010","unstructured":"Coron, J.-S., Kizhvatov, I.: Analysis and improvement of the random delay countermeasure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95\u2013109. Springer, Heidelberg (2010)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Crane, S., Homescu, A., Brunthaler, S., Larsen, P., Franz, M.: Thwarting cache side-channel attacks through dynamic software diversity. In: Network And Distributed System Security Symposium, NDSS. vol. 15 (2015)","DOI":"10.14722\/ndss.2015.23264"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-37288-9_9","volume-title":"Smart Card Research and Advanced Applications","author":"F Durvaux","year":"2013","unstructured":"Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient removal of random delays from embedded software implementations using hidden markov models. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 123\u2013140. Springer, Heidelberg (2013)"},{"issue":"1","key":"9_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1369396.1370017","volume":"5","author":"Thomas Kotzmann","year":"2008","unstructured":"Kotzmann, T., Wimmer, C., M\u00f6ssenb\u00f6ck, H., Rodriguez, T., Russell, K., Cox, D.: Design of the Java Hotspot client compiler for Java 6. TACO 5(1), 7: 1\u20137: 32 (2008)","journal-title":"ACM Transactions on Architecture and Code Optimization"},{"key":"9_CR13","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/3-540-44709-1_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"D May","year":"2001","unstructured":"May, D., Muller, H.L., Smart, N.P.: Random register renaming to foil DPA. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, p. 28. Springer, Heidelberg (2001)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-47719-5_11","volume-title":"Information Security and Privacy","author":"D May","year":"2001","unstructured":"May, D., Muller, H.L., Smart, N.P.: Non-deterministic processors. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, p. 115. Springer, Heidelberg (2001)"},{"key":"9_CR16","unstructured":"Patterson, D.A., Hennessy, J.L.: Computer Organization and Design: The Hardware\/Software Interface, 4th edn. Morgan Kaufmann (2011)"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1145\/330249.330250","volume":"21","author":"M Poletto","year":"1999","unstructured":"Poletto, M., Sarkar, V.: Linear scan register allocation. ACM Trans. Program. Lang. Syst. 21(5), 895\u2013913 (1999)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-31912-9_4","volume-title":"Information Security and Cryptology - ICISC 2011","author":"D Strobel","year":"2012","unstructured":"Strobel, D., Paar, C.: An efficient method for eliminating random delays in power traces of embedded software. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 48\u201360. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45931-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:20:35Z","timestamp":1600474835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45931-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459301","9783319459318"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45931-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}