{"id":"https://openalex.org/W3107799519","doi":"https://doi.org/10.1109/dcis51330.2020.9268660","title":"Microarchitectural Isolation Guarantees Through Execution Based Signatures","display_name":"Microarchitectural Isolation Guarantees Through Execution Based Signatures","publication_year":2020,"publication_date":"2020-11-18","ids":{"openalex":"https://openalex.org/W3107799519","doi":"https://doi.org/10.1109/dcis51330.2020.9268660","mag":"3107799519"},"language":"en","primary_location":{"id":"doi:10.1109/dcis51330.2020.9268660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcis51330.2020.9268660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 XXXV Conference on Design of Circuits and Integrated Systems (DCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062082119","display_name":"Samira Briongos","orcid":"https://orcid.org/0000-0001-7671-0242"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Samira Briongos","raw_affiliation_strings":["CCS-LSI-DIE-UPM"],"affiliations":[{"raw_affiliation_string":"CCS-LSI-DIE-UPM","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072051824","display_name":"Pedro Malag\u00f3n","orcid":"https://orcid.org/0000-0002-8167-508X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pedro Malagon","raw_affiliation_strings":["CCS-LSI-DIE-UPM"],"affiliations":[{"raw_affiliation_string":"CCS-LSI-DIE-UPM","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108005137","display_name":"Jos\u00e9 M. Moya","orcid":"https://orcid.org/0000-0001-7926-9384"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jose M. Moya","raw_affiliation_strings":["CCS-LSI-DIE-UPM"],"affiliations":[{"raw_affiliation_string":"CCS-LSI-DIE-UPM","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["Universit\u00e4t zu L\u00fcbeck"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t zu L\u00fcbeck","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062082119"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15552309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2016","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8111386299133301},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.6337243914604187},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5595036745071411},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4823976755142212},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.4742911458015442},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4633389711380005},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45594820380210876},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.43802610039711},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.41384100914001465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26231855154037476},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.23244863748550415}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8111386299133301},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.6337243914604187},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5595036745071411},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4823976755142212},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.4742911458015442},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4633389711380005},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45594820380210876},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.43802610039711},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.41384100914001465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26231855154037476},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.23244863748550415},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dcis51330.2020.9268660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcis51330.2020.9268660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 XXXV Conference on Design of Circuits and Integrated Systems (DCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W98341770","https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1499791368","https://openalex.org/W1934458198","https://openalex.org/W2051903196","https://openalex.org/W2061354941","https://openalex.org/W2119028650","https://openalex.org/W2157116240","https://openalex.org/W2162585354","https://openalex.org/W2166293920","https://openalex.org/W2172060328","https://openalex.org/W2463516579","https://openalex.org/W2484027757","https://openalex.org/W2507765405","https://openalex.org/W2579697044","https://openalex.org/W2593994116","https://openalex.org/W2604789199","https://openalex.org/W2762430255","https://openalex.org/W2792326895","https://openalex.org/W2883613460","https://openalex.org/W2888798936","https://openalex.org/W2903035991","https://openalex.org/W2911842201","https://openalex.org/W2942418435","https://openalex.org/W2949317607","https://openalex.org/W2951031141","https://openalex.org/W2955544047","https://openalex.org/W2963311060","https://openalex.org/W2964118667","https://openalex.org/W2976763854","https://openalex.org/W2979547870","https://openalex.org/W2982848142","https://openalex.org/W3016246341","https://openalex.org/W3021475380","https://openalex.org/W3036949411","https://openalex.org/W4245276998","https://openalex.org/W4297740902","https://openalex.org/W6628261430","https://openalex.org/W6629297748","https://openalex.org/W6719314992","https://openalex.org/W6720892955","https://openalex.org/W6722264988","https://openalex.org/W6732034840","https://openalex.org/W6734345789","https://openalex.org/W6753443810","https://openalex.org/W6762377113","https://openalex.org/W6764039412","https://openalex.org/W6764402087","https://openalex.org/W6765902080","https://openalex.org/W6775661346"],"related_works":["https://openalex.org/W4250432526","https://openalex.org/W2101536355","https://openalex.org/W2171175484","https://openalex.org/W2085872434","https://openalex.org/W2562747857","https://openalex.org/W4308095153","https://openalex.org/W2026084820","https://openalex.org/W2883183116","https://openalex.org/W4391013600","https://openalex.org/W4213087105"],"abstract_inverted_index":{"Trusted":[0,28],"Execution":[1],"Environments":[2],"(TEEs)":[3],"aim":[4],"to":[5,11,58,101,122,128,139,174,179],"provide":[6],"integrity":[7],"and":[8,49,55,90,160,214],"confidentiality":[9,114],"guarantees":[10,115],"certain":[12],"computations":[13],"irrespective":[14],"of":[15,18,21,53,76,80,132,148,206],"the":[16,19,22,33,37,47,77,85,106,113,125,130,146,149,157,161,168,176,181,187,210],"state":[17,75,183],"rest":[20],"system.":[23],"That":[24],"is,":[25],"they":[26],"protect":[27],"Applications":[29],"(TAs)":[30],"even":[31],"if":[32],"Operating":[34],"System":[35],"or":[36],"hypervisor":[38],"are":[39],"compromised.":[40],"The":[41,74,119],"TEE":[42],"runs":[43],"in":[44,105,145],"parallel":[45],"with":[46,209],"OS":[48],"leverages":[50],"a":[51,92,142,195],"set":[52],"hardware":[54,177,196],"software":[56],"components":[57,79],"create":[59],"such":[60],"an":[61,216],"isolated":[62],"environment.":[63],"However,":[64],"this":[65,135,190],"isolation":[66],"can":[67,164],"be":[68],"broken":[69],"by":[70,186],"exploiting":[71],"microarchitectural":[72,170,182,203],"side-channels.":[73],"shared":[78],"multi-core":[81],"processors":[82],"depends":[83],"on":[84],"actual":[86,211],"processes":[87],"being":[88],"executed,":[89],"as":[91],"result,":[93],"some":[94],"information":[95,166],"is":[96,127,136,154],"leaked":[97],"from":[98,167],"one":[99],"process":[100],"any":[102],"other":[103],"running":[104],"same":[107],"processor.":[108,150],"This":[109],"leakage":[110,126,158],"completely":[111,123],"breaks":[112],"that":[116,152,156,198],"TEEs":[117],"promise.":[118],"only":[120,163],"way":[121],"avoid":[124,129],"share":[131],"resources,":[133],"but":[134],"nearly":[137],"impossible":[138],"achieve":[140],"without":[141],"huge":[143],"degradation":[144],"performance":[147],"Assuming":[151],"it":[153,219],"possible":[155],"exists,":[159],"attacker":[162],"get":[165],"observable":[169],"state,":[171],"we":[172,192],"propose":[173],"monitor":[175],"resources":[178],"detect":[180],"changes":[184],"caused":[185],"attacks.":[188],"To":[189],"end,":[191],"have":[193],"implemented":[194],"module":[197],"compares":[199],"at":[200],"runtime":[201],"pre-stored":[202],"execution":[204,212],"signatures":[205],"each":[207],"enclave,":[208],"trace,":[213],"triggers":[215],"alarm":[217],"when":[218],"detects":[220],"significant":[221],"variation.":[222]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
