{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:00:23Z","timestamp":1740178823419,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T00:00:00Z","timestamp":1544572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s41635-018-0060-3","type":"journal-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T00:33:24Z","timestamp":1544574804000},"page":"26-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["IPA: an Instruction Profiling\u2013Based Micro-architectural Side-Channel Attack on Block Ciphers"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3338-2944","authenticated-orcid":false,"given":"Manaar","family":"Alam","sequence":"first","affiliation":[]},{"given":"Sarani","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Sayan","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Chester","family":"Rebeiro","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,12]]},"reference":[{"key":"60_CR1","doi-asserted-by":"crossref","unstructured":"Acii\u010bmez O (2007) Yet another microarchitectural attack:: exploiting i-cache. In: Proceedings of the 2007 ACM workshop on computer security architecture, pp 11\u201318. ACM","DOI":"10.1145\/1314466.1314469"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u010bmez O, Schindler W, Ko\u010b \u010aK (2007) Cache based remote timing attack on the aes. In: Cryptographers\u2019 track at the RSA conference, pp 271\u2013286. Springer","DOI":"10.1007\/11967668_18"},{"key":"60_CR3","unstructured":"Barreto P. (2003) The aes block cipher in c++. website"},{"key":"60_CR4","unstructured":"Bernstein DJ (2005) Cache-timing attacks on aes"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharya S, Rebeiro C, Mukhopadhyay D (2013) Unraveling timewarp: What all the fuzz is about?. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, pp 8. ACM","DOI":"10.1145\/2487726.2487734"},{"key":"60_CR6","unstructured":"Cox M, Engelschall R, Henson S, Laurie B et al (2002) The openssl project. Google Scholar"},{"key":"60_CR7","unstructured":"Dongarra J, Jagode H, Moore S, Mucci P, Ralph J, Terpstra D, Weaver V Performance application programming interface"},{"issue":"7","key":"60_CR8","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TC.2005.120","volume":"54","author":"R Granger","year":"2005","unstructured":"Granger R, Page D, Stam M (2005) Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three. IEEE Trans Comput 54(7):852\u2013860","journal-title":"IEEE Trans Comput"},{"key":"60_CR9","unstructured":"Guide P (2011) Intel\u00ae 64 and ia-32 architectures software developer\u2019s manual. Volume 3B: System programming Guide, Part 2"},{"key":"60_CR10","unstructured":"Levon J, Elie P (2004) Oprofile: a system profiler for linux"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Liu F, Yarom Y, Ge Q, Heiser G, Lee RB (2015) Last-level cache side-channel attacks are practical. In: 2015 IEEE symposium on security and privacy (SP), pp 605\u2013622. IEEE","DOI":"10.1109\/SP.2015.43"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Martin R, Demme J, Sethumadhavan S (2012) Timewarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. pp 118\u2013129. ACM","DOI":"10.1145\/2366231.2337173"},{"key":"60_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/b17555","volume-title":"Hardware security: Design, threats, and safeguards","author":"D Mukhopadhyay","year":"2014","unstructured":"Mukhopadhyay D, Chakraborty RS (2014) Hardware security: design, threats, and safeguards. Chapman and Hall\/CRC, Boca Raton"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Neve M, Seifert JP, Wang Z (2006) A refined look at bernstein\u2019s aes side-channel analysis. In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 369\u2013369. ACM","DOI":"10.1145\/1128817.1128887"},{"key":"60_CR15","doi-asserted-by":"crossref","unstructured":"Nyberg K (1996) Generalized feistel networks. In: International conference on the theory and application of cryptology and information security, pp 91\u2013104. Springer","DOI":"10.1007\/BFb0034838"},{"key":"60_CR16","doi-asserted-by":"crossref","unstructured":"Osvik DA, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of aes. In: Cryptographers\u2019 track at the RSA conference, pp 1\u201320. Springer","DOI":"10.1007\/11605805_1"},{"key":"60_CR17","unstructured":"Paar C (1994) Efficient vlsi architectures for bit-parallel computation in galois fields. PhD Thesis, Inst. for Experimental Math., Univ. of Essen"},{"key":"60_CR18","doi-asserted-by":"crossref","unstructured":"Rebeiro C, Mondal M, Mukhopadhyay D. (2010) Pinpointing cache timing attacks on aes. In: 23rd international conference on VLSI design, 2010. VLSID\u201910., pp 306\u2013311. IEEE","DOI":"10.1109\/VLSI.Design.2010.29"},{"key":"60_CR19","doi-asserted-by":"crossref","unstructured":"Rebeiro C, Mukhopadhyay D (2011) Cryptanalysis of clefia using differential methods with cache trace patterns. In: Cryptographers\u2019 track at the RSA conference, pp 89\u2013103. Springer","DOI":"10.1007\/978-3-642-19074-2_7"},{"key":"60_CR20","doi-asserted-by":"crossref","unstructured":"Rebeiro C, Mukhopadhyay D, Bhattacharya S (2014) Timing channels in cryptography: a micro-architectural perspective. Springer","DOI":"10.1007\/978-3-319-12370-7"},{"key":"60_CR21","doi-asserted-by":"crossref","unstructured":"Rebeiro C, Mukhopadhyay D, Takahashi J, Fukunaga T (2009) Cache timing attacks on clefia. In: International conference on cryptology in India, pp 104\u2013118. Springer","DOI":"10.1007\/978-3-642-10628-6_7"},{"key":"60_CR22","doi-asserted-by":"crossref","unstructured":"Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit blockcipher clefia. In: International workshop on fast software encryption, pp 181\u2013195. Springer","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"60_CR23","doi-asserted-by":"crossref","unstructured":"Standaert FX, Malkin TG, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Annual international conference on the theory and applications of cryptographic techniques, pp 443\u2013461. Springer","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"60_CR24","unstructured":"Standard AE (2001) Federal information processing standards publication 197. FIPS PUB, pp 46\u20133"},{"key":"60_CR25","doi-asserted-by":"crossref","unstructured":"Wang X, Karri R (2013) Numchecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. In: 2013 50th ACM\/EDAC\/IEEE design automation conference (DAC), pp 1\u20137. IEEE","DOI":"10.1145\/2463209.2488831"},{"issue":"3","key":"60_CR26","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TCAD.2015.2474374","volume":"35","author":"X Wang","year":"2016","unstructured":"Wang X, Karri R (2016) Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits. IEEE Trans Comput Aided Des Integr Circuits Syst 35(3):485\u2013 498","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"60_CR27","doi-asserted-by":"crossref","unstructured":"Wang X, Konstantinou C, Maniatakos M, Karri R (2015) Confirm: Detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of the IEEE\/ACM international conference on computer-aided design, pp 544\u2013551. IEEE Press","DOI":"10.1109\/ICCAD.2015.7372617"},{"key":"60_CR28","unstructured":"Wiki P (2015) perf: Linux profiling with performance counters"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0060-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T19:25:12Z","timestamp":1576092312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0060-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,12]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["60"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0060-3","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2018,12,12]]},"assertion":[{"value":"21 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}