{"id":"https://openalex.org/W3119818949","doi":"https://doi.org/10.1007/978-3-030-10591-4_9","title":"Side Channel Assessment Platforms and Tools for Ubiquitous Systems","display_name":"Side Channel Assessment Platforms and Tools for Ubiquitous Systems","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3119818949","doi":"https://doi.org/10.1007/978-3-030-10591-4_9","mag":"3119818949"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-10591-4_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_9.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_9.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073797976","display_name":"Apostolos P. Fournaris","orcid":"https://orcid.org/0000-0002-4758-2349"},"institutions":[{"id":"https://openalex.org/I4210135709","display_name":"Industrial Systems Institute","ror":"https://ror.org/02sy6k521","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210135709"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Apostolos P. Fournaris","raw_affiliation_strings":["Industrial Systems Institute/R.C. ATHENA, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"Industrial Systems Institute/R.C. ATHENA, Patras, Greece","institution_ids":["https://openalex.org/I4210135709"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009886382","display_name":"Athanassios Moschos","orcid":null},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]},{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["GR","US"],"is_corresponding":false,"raw_author_name":"Athanassios Moschos","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, USA","University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044704128","display_name":"Nicolas Sklavos","orcid":"https://orcid.org/0000-0001-9034-4277"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]},{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["GR","US"],"is_corresponding":false,"raw_author_name":"Nicolas Sklavos","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, USA","University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073797976"],"corresponding_institution_ids":["https://openalex.org/I4210135709"],"apc_list":null,"apc_paid":null,"fwci":0.344,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48707593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"147","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7932531833648682},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7427883148193359},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6396788954734802},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5663565397262573},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.44687843322753906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.429115355014801},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2870430052280426},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1261139214038849},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10026499629020691}],"concepts":[{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7932531833648682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7427883148193359},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6396788954734802},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5663565397262573},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.44687843322753906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.429115355014801},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2870430052280426},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1261139214038849},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10026499629020691},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-10591-4_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_9.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-10591-4_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_9.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3119818949.pdf","grobid_xml":"https://content.openalex.org/works/W3119818949.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W7125584","https://openalex.org/W18192006","https://openalex.org/W29626722","https://openalex.org/W98412359","https://openalex.org/W154633427","https://openalex.org/W200116028","https://openalex.org/W1510418153","https://openalex.org/W1515200869","https://openalex.org/W1515421369","https://openalex.org/W1752434584","https://openalex.org/W1862426464","https://openalex.org/W1958991308","https://openalex.org/W1987476244","https://openalex.org/W2023501640","https://openalex.org/W2149045748","https://openalex.org/W2149209089","https://openalex.org/W2154909745","https://openalex.org/W2293927790","https://openalex.org/W2537000890","https://openalex.org/W2577128016","https://openalex.org/W2728498219","https://openalex.org/W2785011856","https://openalex.org/W2808015086","https://openalex.org/W2912939975","https://openalex.org/W2944942867","https://openalex.org/W2951458793","https://openalex.org/W4213150674"],"related_works":["https://openalex.org/W2120447654","https://openalex.org/W2977179488","https://openalex.org/W2144453115","https://openalex.org/W2128223750","https://openalex.org/W4238532390","https://openalex.org/W2188872161","https://openalex.org/W2002978035","https://openalex.org/W797688974","https://openalex.org/W2209382646","https://openalex.org/W2586133538"],"abstract_inverted_index":{"Abstract":[0],"Side":[1],"Channel":[2],"Attacks":[3],"are":[4],"nowadays":[5],"considered":[6],"a":[7,37,111,167],"serious":[8],"risk":[9],"for":[10,89,170],"many":[11],"security":[12,18],"products":[13],"and":[14,46,69,83,98,105,143,159],"ubiquitous":[15,95],"devices.":[16],"Strong":[17],"solution":[19],"providers":[20],"need":[21,163],"to":[22,57,61,145,164],"evaluate":[23],"their":[24,106],"implementations":[25],"against":[26],"such":[27],"attacks":[28],"before":[29],"publishing":[30],"them":[31],"on":[32,119,131],"the":[33,49,62,70,75,85,100,120,132,152,162,171],"market,":[34],"thus":[35],"performing":[36],"thorough":[38],"assessment.":[39],"However,":[40],"this":[41,79],"procedure":[42],"is":[43],"not":[44],"straightforward":[45],"even":[47],"with":[48],"appropriate":[50],"equipment,":[51],"it":[52],"may":[53],"require":[54],"considerable":[55],"time":[56],"provide":[58],"results":[59],"due":[60],"slow":[63],"process":[64],"of":[65,73],"collecting":[66],"measurements":[67],"(traces)":[68],"inflexible":[71],"way":[72],"controlling":[74],"tested":[76],"implementation.":[77],"In":[78],"chapter,":[80],"we":[81,137],"explore":[82],"overview":[84],"trace":[86,102,112],"collection":[87,103,113],"landscape":[88],"generic":[90],"devices":[91],"under":[92,173],"test":[93],"(including":[94],"systems)":[96],"highlighting":[97],"overviewing":[99],"latest":[101],"toolsets":[104],"shortcomings,":[107],"but":[108],"also":[109],"proposing":[110],"approach":[114,130],"that":[115],"can":[116,155],"be":[117],"applied":[118],"most":[121],"recent,":[122],"open":[123],"source":[124],"toolsets.":[125],"We":[126],"showcase":[127],"our":[128,141],"proposed":[129,153],"FlexLeco":[133],"project":[134],"architecture,":[135],"which":[136],"have":[138],"developed":[139],"in":[140],"lab,":[142],"manage":[144],"practically":[146],"describe":[147],"how":[148],"an":[149],"evaluator":[150],"using":[151],"methodology":[154],"collect":[156],"traces":[157],"easily":[158],"quickly":[160],"without":[161],"completely":[165],"redesign":[166],"control":[168],"mechanism":[169],"implementation":[172],"test.":[174]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
