{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:21:30Z","timestamp":1743157290421,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319715001"},{"type":"electronic","value":"9783319715018"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71501-8_3","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:46:46Z","timestamp":1511250406000},"page":"30-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers"],"prefix":"10.1007","author":[{"given":"Manaar","family":"Alam","sequence":"first","affiliation":[]},{"given":"Sarani","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Acii\u00e7mez, O.: Yet another microarchitectural attack: : exploiting I-cache. In: Proceedings of the 2007 ACM Workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, 2 November 2007, pp. 11\u201318 (2007)","DOI":"10.1145\/1314466.1314469"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Cache based remote timing attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 271\u2013286. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11967668_18"},{"key":"3_CR3","unstructured":"Barreto, P.S.L.M.: The AES block cipher in C++"},{"key":"3_CR4","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. Techical report (2005)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-33481-8_9","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Lange, T., Schwabe, P.: The security impact of a new cryptographic library. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 159\u2013176. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33481-8_9"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Rebeiro, C., Mukhopadhyay, D.: Unraveling timewarp: what all the fuzz is about? In: HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, 23\u201324 June 2013, p. 8 (2013)","DOI":"10.1145\/2487726.2487734"},{"key":"3_CR7","unstructured":"Federal Information Processing Standards Publication 197. Announcing the Advanced Encryption Standard (AES)"},{"issue":"7","key":"3_CR8","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TC.2005.120","volume":"54","author":"R Granger","year":"2005","unstructured":"Granger, R., Page, D., Stam, M.: Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three. IEEE Trans. Comput. 54(7), 852\u2013860 (2005)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR9","unstructured":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 3 (3A, 3B, 3C & 3D): System Programming Guide (2010)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17\u201321 May 2015, pp. 605\u2013622 (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Martin, R., Demme, J., Sethumadhavan, S.: Timewarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. In: 39th International Symposium on Computer Architecture (ISCA 2012), Portland, OR, USA, 9\u201313 June 2012, pp. 118\u2013129 (2012)","DOI":"10.1109\/ISCA.2012.6237011"},{"key":"3_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/b17555","volume-title":"Hardware Security: Design, Threats, and Safeguards","author":"D Mukhopadhyay","year":"2014","unstructured":"Mukhopadhyay, D., Chakraborty, R.S.: Hardware Security: Design, Threats, and Safeguards, 1st edn. Chapman & Hall\/CRC, Boca Raton (2014)","edition":"1"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Neve, M., Seifert, J., Wang, Z.: A refined look at Bernstein\u2019s AES side-channel analysis. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, 21\u201324 March 2006, p. 369 (2006)","DOI":"10.1145\/1128817.1128887"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology\u2014ASIACRYPT 1996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized Feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0034838"},{"key":"3_CR15","unstructured":"OProfile (2015). http:\/\/oprofile.sourceforge.net\/news\/"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"3_CR17","unstructured":"perf: Linux profiling with performance counters (2015)"},{"key":"3_CR18","unstructured":"Performance Application Programming Interface (2016)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Rebeiro, C., Mondal, M., Mukhopadhyay, D.: Pinpointing cache timing attacks on AES. In: VLSI Design 2010: 23rd International Conference on VLSI Design, 9th International Conference on Embedded Systems, Bangalore, India, 3\u20137 January 2010, pp. 306\u2013311 (2010)","DOI":"10.1109\/VLSI.Design.2010.29"},{"key":"3_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12370-7","volume-title":"Timing Channels in Cryptography: A Micro-Architectural Perspective","author":"C Rebeiro","year":"2014","unstructured":"Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S.: Timing Channels in Cryptography: A Micro-Architectural Perspective. Springer Publishing Company, Incorporated, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12370-7"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-10628-6_7","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"C Rebeiro","year":"2009","unstructured":"Rebeiro, C., Mukhopadhyay, D., Takahashi, J., Fukunaga, T.: Cache timing attacks on clefia. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 104\u2013118. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10628-6_7"},{"key":"3_CR22","unstructured":"Sony Corporation: The 128-bit blockcipher Clefia: Algorithm specification (2007)"},{"key":"3_CR23","unstructured":"The OpenSSL Project. http:\/\/www.openssl.org"},{"key":"3_CR24","unstructured":"Unix Stack Exchange. https:\/\/unix.stackexchange.com\/questions\/2126\/why-is-there-a-big-delay-after-entering-a-wrong-password"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., Karri, R.: Numchecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. In: The 50th Annual Design Automation Conference 2013, DAC 2013, Austin, TX, USA, 29 May\u201307 June 2013, pp. 79:1\u201379:7 (2013)","DOI":"10.1145\/2463209.2488831"},{"issue":"3","key":"3_CR26","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TCAD.2015.2474374","volume":"35","author":"X Wang","year":"2016","unstructured":"Wang, X., Karri, R.: Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits. IEEE Trans. CAD Integr. Circuits Syst. 35(3), 485\u2013498 (2016)","journal-title":"IEEE Trans. CAD Integr. Circuits Syst."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Wang, X., Konstantinou, C., Maniatakos, M., Karri, R.: Confirm: detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, ICCAD 2015, Austin, TX, USA, 2\u20136 November 2015, pp. 544\u2013551 (2015)","DOI":"10.1109\/ICCAD.2015.7372617"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71501-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:48:32Z","timestamp":1709819312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71501-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319715001","9783319715018"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71501-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Goa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.space.dbcegoa.ac.in\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}