{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:31Z","timestamp":1750308031353,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314276.1314282","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Drm to counter side-channel attacks?"],"prefix":"10.1145","author":[{"given":"Ryad","family":"Benadjila","sequence":"first","affiliation":[{"name":"Orange Labs, Issy-les-Moulineaux, France"}]},{"given":"Olivier","family":"Billet","sequence":"additional","affiliation":[{"name":"Orange Labs, Issy-les-Moulineaux, France"}]},{"given":"Stanislas","family":"Francfort","sequence":"additional","affiliation":[{"name":"Orange Labs, Issy-les-Moulineaux, France"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"B.\n       \n      Barak O.\n       \n      Goldreich R.\n       \n      Impagliazzo S.\n       \n      Rudich A.\n       \n      Sahai S. P.\n       \n      Vadhan and \n      \n      \n      K.\n       \n      Yang\n      \n  \n  . \n  On the (Im)possibility of Obfuscating Programs. In J. Kilian editor Advances in Cryptology CRYPTO\n   \n  2001 volume \n  2139\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  18\n  . \n  Springer 2001.   B. Barak O. Goldreich R. Impagliazzo S. Rudich A. Sahai S. P. Vadhan and K. Yang. On the (Im)possibility of Obfuscating Programs. In J. Kilian editor Advances in Cryptology CRYPTO 2001 volume 2139 of Lecture Notes in Computer Science pages 1--18. Springer 2001.","DOI":"10.1007\/3-540-44647-8_1"},{"key":"e_1_3_2_1_3_1","unstructured":"D. J. Bernstein. Cache-timing attacks on AES 2005. http:\/\/cr.yp.to\/papers.html#cachetiming preprint.  D. J. Bernstein. Cache-timing attacks on AES 2005. http:\/\/cr.yp.to\/papers.html#cachetiming preprint."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"O.\n       \n      Billet H.\n       \n      Gilbert and \n      \n      \n      C.\n       \n      EchChatbi\n    .\n      \n  \n   \n  Cryptanalysis of a white box AES implementation. In H. Handschuh and A. Hasan editors Selected areas in cryptography SAC\n   \n  2004 volume \n  3357\n   of \n  Lecture Notes in Computer Science page \n  227\n  . Springer 2004.  O. Billet H. Gilbert and C. EchChatbi. Cryptanalysis of a white box AES implementation. In H. Handschuh and A. Hasan editors Selected areas in cryptography SAC 2004 volume 3357 of Lecture Notes in Computer Science page 227. Springer 2004.","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_1_7_1","unstructured":"A. Canteaut C. Lauradoux and A. Seznec. Understanding cache attacks 2006. http:\/\/hal.inria.fr\/inria-00071387.  A. Canteaut C. Lauradoux and A. Seznec. Understanding cache attacks 2006. http:\/\/hal.inria.fr\/inria-00071387."},{"key":"e_1_3_2_1_8_1","first-page":"250","volume-title":"Selected Areas in Cryptography","author":"Chow S.","year":"2002"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Digital Rights Management Workshop","author":"Chow S.","year":"2002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"K.\n       \n      Gandolfi C.\n       \n      Mourtel and \n      \n      \n      F.\n       \n      Olivier\n      \n  \n  . \n  Electromagnetic analysis: Concrete results. In Cetin Kaya Koc D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems CHES\n   \n  2001 volume \n  2162\n   of \n  Lecture Notes in Computer Science pages \n  251\n  --\n  261\n  . \n  Springer 2001.   K. Gandolfi C. Mourtel and F. Olivier. Electromagnetic analysis: Concrete results. In Cetin Kaya Koc D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems CHES 2001 volume 2162 of Lecture Notes in Computer Science pages 251--261. Springer 2001.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Jacob D.\n       \n      Boneh and \n      \n      \n      E. W.\n       \n      Felten\n      \n  \n  . \n  Attacking an obfuscated cipher by injecting faults. In J. Feigenbaum editor Digital rights management workshop DRM\n   \n  2002 volume \n  2696\n   of \n  Lecture Notes in Computer Science pages \n  16\n  --\n  31\n  . \n  Springer 2003.  M. Jacob D. Boneh and E. W. Felten. Attacking an obfuscated cipher by injecting faults. In J. Feigenbaum editor Digital rights management workshop DRM 2002 volume 2696 of Lecture Notes in Computer Science pages 16--31. Springer 2003.","DOI":"10.1007\/978-3-540-44993-5_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P. C.\n       \n      Kocher\n    .\n      \n  \n   \n  Timing attacks on implementations of diffie-hellman RSA DSS and other systems. In N. Koblitz editor Advances in Cryptology CRYPTO '96 volume \n  1109\n   of \n  Lecture Notes in Computer Science pages \n  104\n  --\n  113\n  . \n  Springer 1996\n  .   P. C. Kocher. Timing attacks on implementations of diffie-hellman RSA DSS and other systems. In N. Koblitz editor Advances in Cryptology CRYPTO '96 volume 1109 of Lecture Notes in Computer Science pages 104--113. Springer 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"P. C.\n       \n      Kocher J.\n       \n      Jaffe and \n      \n      \n      B.\n       \n      Jun\n      \n  \n  . \n  Differential power analysis. In M. J. Wiener editor Advances in Cryptology CRYPTO '99 volume \n  1666\n   of \n  Lecture Notes in Computer Science pages \n  388\n  --\n  397\n  . \n  Springer 1999\n  .   P. C. Kocher J. Jaffe and B. Jun. Differential power analysis. In M. J. Wiener editor Advances in Cryptology CRYPTO '99 volume 1666 of Lecture Notes in Computer Science pages 388--397. Springer 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_17_1","unstructured":"F. Koeune and J.-J. Quisquater. A timing attack against Rijndael 1999. Preprint available from http:\/\/www.dice.ucl.ac.be\/crypto\/tech_reports\/.  F. Koeune and J.-J. Quisquater. A timing attack against Rijndael 1999. Preprint available from http:\/\/www.dice.ucl.ac.be\/crypto\/tech_reports\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.100"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"B.\n       \n      Lynn M.\n       \n      Prabhakaran and \n      \n      \n      A.\n       \n      Sahai\n      \n  \n  . \n  Positive Results and Techniques for Obfuscation. In C. Cachin and J. Camenisch editors Advances in Cryptology EUROCRYPT\n   \n  2004 volume \n  3027\n   of \n  Lecture Notes in Computer Science pages \n  20\n  --\n  39\n  . \n  Springer 2004.  B. Lynn M. Prabhakaran and A. Sahai. Positive Results and Techniques for Obfuscation. In C. Cachin and J. Camenisch editors Advances in Cryptology EUROCRYPT 2004 volume 3027 of Lecture Notes in Computer Science pages 20--39. Springer 2004.","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"e_1_3_2_1_20_1","unstructured":"National Institute of Standards and Technology. FIPS 46-3: Data Encryption Standard October 1999. http:\/\/csrc.nist.gov.  National Institute of Standards and Technology. FIPS 46-3: Data Encryption Standard October 1999. http:\/\/csrc.nist.gov."},{"volume-title":"UCL","year":"2006","author":"Neve M.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"M.\n       \n      Neve\n     and \n      \n      \n      J.-P.\n       \n      Seifert\n    .\n      \n  \n   \n  Advances on access-driven cache attacks on AES. In E. Biham and A. Youssef editors Selected areas in cryptography SAC\n   \n  2006 volume \n  4356\n   of \n  Lecture Notes in Computer Science pages \n  174\n  --\n  187\n  . \n  Springer 2006.  M. Neve and J.-P. Seifert. Advances on access-driven cache attacks on AES. In E. Biham and A. Youssef editors Selected areas in cryptography SAC 2006 volume 4356 of Lecture Notes in Computer Science pages 174--187. Springer 2006."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128887"},{"key":"e_1_3_2_1_24_1","unstructured":"OpenSSL. openssl-0.9.8e February 2007. http:\/\/www.openssl.org.  OpenSSL. openssl-0.9.8e February 2007. http:\/\/www.openssl.org."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_26_1","unstructured":"C. Percival. Cache missing for fun and profit 2005. Available from http:\/\/www.daemonology.net\/.  C. Percival. Cache missing for fun and profit 2005. Available from http:\/\/www.daemonology.net\/."},{"volume-title":"McGraw-Hill Higher Education","year":"2004","author":"Shen J. P.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_6"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Digital Rights Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314276.1314282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":26,"alternative-id":["10.1145\/1314276.1314282","10.1145\/1314276"],"URL":"https:\/\/doi.org\/10.1145\/1314276.1314282","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}