{"id":"https://openalex.org/W4200584635","doi":"https://doi.org/10.1109/hpec49654.2021.9622848","title":"Timing-based side-channel attack and mitigation on PCIe connected distributed embedded systems","display_name":"Timing-based side-channel attack and mitigation on PCIe connected distributed embedded systems","publication_year":2021,"publication_date":"2021-09-20","ids":{"openalex":"https://openalex.org/W4200584635","doi":"https://doi.org/10.1109/hpec49654.2021.9622848"},"language":"en","primary_location":{"id":"doi:10.1109/hpec49654.2021.9622848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec49654.2021.9622848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046455761","display_name":"Salman Abdul Khaliq","orcid":"https://orcid.org/0000-0001-6642-4496"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Salman Abdul Khaliq","raw_affiliation_strings":["University of Connecticut"],"affiliations":[{"raw_affiliation_string":"University of Connecticut","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101954136","display_name":"Usman Ali","orcid":"https://orcid.org/0000-0003-3359-9817"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Usman Ali","raw_affiliation_strings":["University of Connecticut"],"affiliations":[{"raw_affiliation_string":"University of Connecticut","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048129220","display_name":"Omer Khan","orcid":"https://orcid.org/0000-0001-6293-7403"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Omer Khan","raw_affiliation_strings":["University of Connecticut"],"affiliations":[{"raw_affiliation_string":"University of Connecticut","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046455761"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6798,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76601213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pci-express","display_name":"PCI Express","score":0.9464352130889893},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.783218264579773},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.6171282529830933},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5997877717018127},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5797557234764099},{"id":"https://openalex.org/keywords/central-processing-unit","display_name":"Central processing unit","score":0.569465696811676},{"id":"https://openalex.org/keywords/cpu-shielding","display_name":"CPU shielding","score":0.5174882411956787},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4528903663158417},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.44436579942703247},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4236315190792084},{"id":"https://openalex.org/keywords/direct-memory-access","display_name":"Direct memory access","score":0.419153094291687},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3645660877227783},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3570671081542969},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1898707151412964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15604722499847412},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.11793068051338196}],"concepts":[{"id":"https://openalex.org/C64270927","wikidata":"https://www.wikidata.org/wiki/Q206924","display_name":"PCI Express","level":3,"score":0.9464352130889893},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.783218264579773},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.6171282529830933},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5997877717018127},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5797557234764099},{"id":"https://openalex.org/C49154492","wikidata":"https://www.wikidata.org/wiki/Q5300","display_name":"Central processing unit","level":2,"score":0.569465696811676},{"id":"https://openalex.org/C180613757","wikidata":"https://www.wikidata.org/wiki/Q5013757","display_name":"CPU shielding","level":3,"score":0.5174882411956787},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4528903663158417},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.44436579942703247},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4236315190792084},{"id":"https://openalex.org/C37724790","wikidata":"https://www.wikidata.org/wiki/Q210813","display_name":"Direct memory access","level":3,"score":0.419153094291687},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3645660877227783},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3570671081542969},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1898707151412964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15604722499847412},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.11793068051338196},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpec49654.2021.9622848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec49654.2021.9622848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W2092160538","https://openalex.org/W2238149288","https://openalex.org/W2337480911","https://openalex.org/W2612454599","https://openalex.org/W2810584084","https://openalex.org/W2889508486","https://openalex.org/W2952265249","https://openalex.org/W2964420875","https://openalex.org/W2979547870","https://openalex.org/W3015942900","https://openalex.org/W3017008359","https://openalex.org/W3047312994","https://openalex.org/W3139156009","https://openalex.org/W3154803439","https://openalex.org/W4213350745","https://openalex.org/W6628261430","https://openalex.org/W6754306559","https://openalex.org/W6766366649"],"related_works":["https://openalex.org/W2092798601","https://openalex.org/W1587042134","https://openalex.org/W2054093036","https://openalex.org/W2746861419","https://openalex.org/W1548268164","https://openalex.org/W1670050423","https://openalex.org/W2978920629","https://openalex.org/W2774600468","https://openalex.org/W2090318149","https://openalex.org/W4200584635"],"abstract_inverted_index":{"PCIe":[0,22,58],"connected":[1,16,77],"peripheral":[2,33,78,99,139],"devices":[3,34,79,100,140],"are":[4,81,117],"increasingly":[5],"deployed":[6],"in":[7],"distributed":[8],"embedded":[9],"systems.":[10],"For":[11],"example,":[12],"a":[13,18,70,120],"GPU":[14,96],"accelerator":[15],"with":[17],"host":[19,42,50,63,106],"CPU":[20,43,51,64],"via":[21],"interconnect":[23,59],"brings":[24,53],"massive":[25],"performance":[26,45],"improvement":[27],"for":[28,44],"artificial":[29],"intelligence":[30],"applications.":[31],"These":[32],"benefit":[35],"from":[36,104],"the":[37,41,49,62,84,105,138,143,151,155],"shared":[38,57],"memory":[39],"of":[40,61,95,123,154],"gains,":[46],"but":[47],"sharing":[48],"resources":[52],"security":[54,152],"challenges.":[55],"The":[56,145],"hardware":[60],"can":[65],"be":[66],"exploited":[67],"to":[68,141],"create":[69],"timing-based":[71],"information":[72,114],"leakage":[73,115],"side-channel":[74],"between":[75,137],"multiple":[76],"that":[80,93,133],"isolated":[82],"at":[83,119],"software":[85],"level.":[86],"This":[87],"paper":[88,146],"proposes":[89],"an":[90],"attack":[91,157],"setup":[92],"consists":[94],"and":[97,113,158],"FPGA":[98],"accessing":[101],"their":[102],"data":[103],"CPU\u2019s":[107],"main":[108],"memory.":[109],"Both":[110],"covert":[111],"communication":[112],"attacks":[116],"demonstrated":[118],"throughput":[121],"rate":[122],"13.02":[124],"kbps.":[125],"A":[126],"temporal":[127],"isolation-based":[128],"mitigation":[129],"scheme":[130],"is":[131],"proposed":[132,156],"utilizes":[134],"time-division":[135],"multiplexing":[136],"mitigate":[142],"attacks.":[144],"primarily":[147],"focuses":[148],"on":[149],"demonstrating":[150],"context":[153],"mitigation.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
