{"id":"https://openalex.org/W3041092151","doi":"https://doi.org/10.1109/isqed48828.2020.9137008","title":"Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks","display_name":"Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3041092151","doi":"https://doi.org/10.1109/isqed48828.2020.9137008","mag":"3041092151"},"language":"en","primary_location":{"id":"doi:10.1109/isqed48828.2020.9137008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed48828.2020.9137008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089319301","display_name":"Abhijitt Dhavlle","orcid":"https://orcid.org/0000-0003-4789-6484"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abhijitt Dhavlle","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, George Mason University, Fairfax, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112197515","display_name":"Raj Mehta","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raj Mehta","raw_affiliation_strings":["Dept. of ECE, George Mason University, Fairfax, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE, George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103033046","display_name":"Setareh Rafatirad","orcid":"https://orcid.org/0000-0003-2035-8512"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Setareh Rafatirad","raw_affiliation_strings":["Dept. of Information Sciences and Technology, George Mason University, Fairfax, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Sciences and Technology, George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047382437","display_name":"Houman Homayoun","orcid":"https://orcid.org/0000-0001-8904-4699"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houman Homayoun","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, University of California, Davis, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, University of California, Davis, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047725314","display_name":"Sai Manoj Pudukotai Dinakarrao","orcid":"https://orcid.org/0000-0002-4417-2387"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Manoj Pudukotai Dinakarrao","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, George Mason University, Fairfax, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089319301"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":1.0605,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82020771,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7177295684814453},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6843882203102112},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6353004574775696},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5354215502738953},{"id":"https://openalex.org/keywords/shield","display_name":"Shield","score":0.47148892283439636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41919395327568054},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15189900994300842},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09607532620429993},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.09153085947036743}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7177295684814453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6843882203102112},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6353004574775696},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5354215502738953},{"id":"https://openalex.org/C138081364","wikidata":"https://www.wikidata.org/wiki/Q852013","display_name":"Shield","level":2,"score":0.47148892283439636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41919395327568054},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15189900994300842},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09607532620429993},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.09153085947036743},{"id":"https://openalex.org/C5900021","wikidata":"https://www.wikidata.org/wiki/Q163082","display_name":"Petrology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed48828.2020.9137008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed48828.2020.9137008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1253017325","https://openalex.org/W1427174644","https://openalex.org/W1969949656","https://openalex.org/W1992291252","https://openalex.org/W2025539306","https://openalex.org/W2073524356","https://openalex.org/W2102089995","https://openalex.org/W2106728965","https://openalex.org/W2131202839","https://openalex.org/W2137453738","https://openalex.org/W2166293920","https://openalex.org/W2216890204","https://openalex.org/W2337480911","https://openalex.org/W2540422252","https://openalex.org/W2766026515","https://openalex.org/W2810584084","https://openalex.org/W2886636392","https://openalex.org/W2889467723","https://openalex.org/W2897417741","https://openalex.org/W2898907321","https://openalex.org/W2945698147","https://openalex.org/W2989854730","https://openalex.org/W2990160360","https://openalex.org/W2998465829","https://openalex.org/W2998855125","https://openalex.org/W3029601593","https://openalex.org/W6628036068","https://openalex.org/W6675887568","https://openalex.org/W6754227972","https://openalex.org/W6754707075","https://openalex.org/W6778437264"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W4214838992","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W4240241597","https://openalex.org/W3196561854"],"abstract_inverted_index":{"The":[0,23,72],"hardware":[1],"systems":[2],"have":[3],"experienced":[4],"a":[5,44],"plethora":[6],"of":[7,19,112,165],"side-channel":[8,83],"attacks":[9],"(SCAs)":[10],"in":[11,69,80],"recent":[12],"years":[13],"with":[14],"cache-based":[15],"SCAs":[16,24,142],"being":[17,127],"one":[18],"the":[20,26,40,63,78,81,90,95,105,110,113,117,121,125,149,154,163],"dominant":[21],"threats.":[22],"exploit":[25],"architectural":[27,53],"caveats,":[28],"which":[29],"invariably":[30],"leak":[31],"essential":[32],"information":[33,84,114,126,151],"during":[34],"an":[35],"application's":[36],"execution.":[37],"Shutting":[38],"down":[39],"side-channels":[41],"is":[42,156],"not":[43],"feasible":[45],"approach":[46],"due":[47],"to":[48,76,88,119,158],"various":[49],"restrictions,":[50],"such":[51,59,143],"as":[52,144],"changes":[54],"and":[55,61,100,146,148],"complexity.":[56],"To":[57,92],"overcome":[58],"concerns":[60],"protect":[62],"data":[64],"integrity,":[65],"we":[66],"introduce":[67],"Entropy-Shield":[68,74,97],"this":[70],"work.":[71],"proposed":[73,96,166],"aims":[75],"maximize":[77],"entropy":[79,111],"leaked":[82],"rather":[85],"than":[86],"attempting":[87],"close":[89],"side-channels.":[91],"achieve":[93],"this,":[94],"introduces":[98],"carefully":[99],"sensibly":[101],"crafted":[102],"perturbations":[103],"into":[104],"victim":[106],"application,":[107],"thereby":[108],"increasing":[109],"obtained":[115],"by":[116,153],"attacker":[118,155],"deduce":[120],"secret":[122],"key,":[123],"while":[124],"observed":[128],"looks":[129],"legit":[130],"yet":[131],"futile.":[132],"This":[133],"methodology":[134],"has":[135],"been":[136],"successfully":[137],"tested":[138],"on":[139],"cache":[140],"targeted":[141],"Flush+Reload":[145],"Flush+Flush":[147],"key":[150],"retrieved":[152],"shown":[157],"be":[159],"ultimately":[160],"futile,":[161],"indicating":[162],"success":[164],"Entropy-Shield.":[167]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
