{"id":"https://openalex.org/W4213368512","doi":"https://doi.org/10.1109/asp-dac52403.2022.9712572","title":"SC-K9: A Self-synchronizing Framework to Counter Micro-architectural Side Channels","display_name":"SC-K9: A Self-synchronizing Framework to Counter Micro-architectural Side Channels","publication_year":2022,"publication_date":"2022-01-17","ids":{"openalex":"https://openalex.org/W4213368512","doi":"https://doi.org/10.1109/asp-dac52403.2022.9712572"},"language":"en","primary_location":{"id":"doi:10.1109/asp-dac52403.2022.9712572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asp-dac52403.2022.9712572","pdf_url":null,"source":{"id":"https://openalex.org/S4363608500","display_name":"2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012909235","display_name":"Hongyu Fang","orcid":"https://orcid.org/0000-0002-5951-1556"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongyu Fang","raw_affiliation_strings":["The George Washington University,Washington, DC,USA","The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"The George Washington University,Washington, DC,USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042973603","display_name":"Milo\u0161 Doroslova\u010dki","orcid":"https://orcid.org/0000-0003-4101-3249"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Doroslovacki","raw_affiliation_strings":["The George Washington University,Washington, DC,USA","The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"The George Washington University,Washington, DC,USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045879054","display_name":"Guru Venkataramani","orcid":"https://orcid.org/0000-0002-7084-7560"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guru Venkataramani","raw_affiliation_strings":["The George Washington University,Washington, DC,USA","The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"The George Washington University,Washington, DC,USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012909235"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.1041,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22701072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"11","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/synchronizing","display_name":"Synchronizing","score":0.8787866830825806},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.839389979839325},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8358446359634399},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7949842214584351},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6005676984786987},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.503396213054657},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.431702584028244},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4156496226787567},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35389864444732666},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3265102803707123},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1456332802772522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1357368528842926},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1040617823600769},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08286780118942261}],"concepts":[{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.8787866830825806},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.839389979839325},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8358446359634399},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7949842214584351},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6005676984786987},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.503396213054657},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.431702584028244},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4156496226787567},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35389864444732666},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3265102803707123},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1456332802772522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1357368528842926},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1040617823600769},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08286780118942261},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asp-dac52403.2022.9712572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asp-dac52403.2022.9712572","pdf_url":null,"source":{"id":"https://openalex.org/S4363608500","display_name":"2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G121114724","display_name":null,"funder_award_id":"N00014-21-1-2520","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1555558540","https://openalex.org/W1934458198","https://openalex.org/W1965071495","https://openalex.org/W2014182302","https://openalex.org/W2036853599","https://openalex.org/W2116538232","https://openalex.org/W2147657366","https://openalex.org/W2888798936","https://openalex.org/W2889508486","https://openalex.org/W2900966859","https://openalex.org/W2901937773","https://openalex.org/W2903910116","https://openalex.org/W2914174770","https://openalex.org/W2918527634","https://openalex.org/W2948169647","https://openalex.org/W2949090999","https://openalex.org/W2963311060","https://openalex.org/W2979849111","https://openalex.org/W2989861912","https://openalex.org/W3016526453","https://openalex.org/W3017008359","https://openalex.org/W3092271037","https://openalex.org/W3101300690","https://openalex.org/W3135146000","https://openalex.org/W4233119454","https://openalex.org/W6633448724","https://openalex.org/W6754306559","https://openalex.org/W6758777963","https://openalex.org/W6778035576"],"related_works":["https://openalex.org/W2359328895","https://openalex.org/W2363535981","https://openalex.org/W2007402811","https://openalex.org/W2326762630","https://openalex.org/W2391354408","https://openalex.org/W1986103452","https://openalex.org/W2166562438","https://openalex.org/W2388558702","https://openalex.org/W1963782047","https://openalex.org/W2922420188"],"abstract_inverted_index":{"Side":[0],"channels":[1,118],"within":[2],"the":[3,41,44,65,69,74,92,99,115,148],"processor":[4],"mi-croarchitecture":[5],"are":[6],"notorious":[7],"for":[8,19],"their":[9],"ability":[10],"to":[11,28,39,90],"leak":[12],"information":[13],"without":[14,37],"leaving":[15],"any":[16],"physical":[17],"traces":[18],"forensic":[20],"examination.":[21],"Most":[22],"prior":[23],"detection":[24,70],"frame-works":[25],"typically":[26],"choose":[27],"continuously":[29],"sample":[30],"a":[31,54,86],"select":[32],"subset":[33],"of":[34,64,76,114,144],"hardware":[35],"events":[36],"attempting":[38],"understand":[40],"mechanics":[42],"behind":[43],"side":[45,100,117],"channel":[46,101],"activity.":[47],"In":[48],"this":[49],"work,":[50],"we":[51],"propose":[52],"SC-K9,":[53],"novel":[55],"framework":[56],"that":[57,63,129],"synchronizes":[58],"its":[59,96,109],"sampling":[60],"frequency":[61,75],"with":[62,80],"adversary,":[66],"thereby":[67],"improving":[68],"accuracy":[71],"even":[72],"when":[73],"attack":[77],"operations":[78],"vary":[79],"specific":[81],"implementations.":[82],"We":[83,103],"then":[84],"deploy":[85],"hardware-based":[87],"deception":[88],"strategy":[89],"trick":[91],"adversary":[93],"and":[94,107,139],"annul":[95],"observations":[97],"from":[98],"activities.":[102],"illustrate":[104],"our":[105],"design":[106],"demonstrate":[108],"effectiveness":[110],"in":[111],"identifying":[112],"some":[113],"potent":[116],"exposed":[119],"by":[120],"recent":[121],"speculative":[122],"execution":[123],"attacks.":[124],"Our":[125],"experimental":[126],"results":[127],"show":[128],"SC-K9":[130],"can":[131],"effectively":[132],"spot":[133],"adversaries":[134],"at":[135],"different":[136],"operational":[137],"modes,":[138],"incurs":[140],"very":[141],"low":[142],"rate":[143],"false":[145],"alarms":[146],"among":[147],"benign":[149],"workloads.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
