{"id":"https://openalex.org/W3083702481","doi":"https://doi.org/10.1109/mwscas48704.2020.9184539","title":"Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures","display_name":"Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3083702481","doi":"https://doi.org/10.1109/mwscas48704.2020.9184539","mag":"3083702481"},"language":"en","primary_location":{"id":"doi:10.1109/mwscas48704.2020.9184539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas48704.2020.9184539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080844858","display_name":"Hossein Sayadi","orcid":"https://orcid.org/0000-0001-6423-0145"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hossein Sayadi","raw_affiliation_strings":["California State University, Long Beach"],"affiliations":[{"raw_affiliation_string":"California State University, Long Beach","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100452654","display_name":"Han Wang","orcid":"https://orcid.org/0000-0001-7347-3763"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Han Wang","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027149833","display_name":"Tahereh Miari","orcid":null},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tahereh Miari","raw_affiliation_strings":["California State University, Long Beach"],"affiliations":[{"raw_affiliation_string":"California State University, Long Beach","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044003457","display_name":"Hosein Mohammadi Makrani","orcid":"https://orcid.org/0000-0002-5088-8728"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hosein Mohammadi Makrani","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074064662","display_name":"Mehrdad Aliasgari","orcid":"https://orcid.org/0000-0002-9019-6857"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mehrdad Aliasgari","raw_affiliation_strings":["California State University, Long Beach"],"affiliations":[{"raw_affiliation_string":"California State University, Long Beach","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103033046","display_name":"Setareh Rafatirad","orcid":"https://orcid.org/0000-0003-2035-8512"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Setareh Rafatirad","raw_affiliation_strings":["George Mason University, Davis"],"affiliations":[{"raw_affiliation_string":"George Mason University, Davis","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047382437","display_name":"Houman Homayoun","orcid":"https://orcid.org/0000-0001-8904-4699"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houman Homayoun","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5080844858"],"corresponding_institution_ids":["https://openalex.org/I59897056"],"apc_list":null,"apc_paid":null,"fwci":2.5186,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91429804,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"949","last_page":"952"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8051762580871582},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.7660814523696899},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7155439853668213},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6030707955360413},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5253567099571228},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4637584984302521},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45372819900512695},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4387011229991913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3468199372291565},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2777200937271118},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2154356837272644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8051762580871582},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.7660814523696899},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7155439853668213},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6030707955360413},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5253567099571228},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4637584984302521},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45372819900512695},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4387011229991913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3468199372291565},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2777200937271118},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2154356837272644},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwscas48704.2020.9184539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas48704.2020.9184539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1570713908","https://openalex.org/W1934458198","https://openalex.org/W1968519345","https://openalex.org/W2024702059","https://openalex.org/W2034053858","https://openalex.org/W2067452806","https://openalex.org/W2113261561","https://openalex.org/W2166844173","https://openalex.org/W2292977173","https://openalex.org/W2507765405","https://openalex.org/W2508317201","https://openalex.org/W2522718524","https://openalex.org/W2602229646","https://openalex.org/W2792326895","https://openalex.org/W2803900647","https://openalex.org/W2809457377","https://openalex.org/W2893549539","https://openalex.org/W2917061593","https://openalex.org/W2945027786","https://openalex.org/W2945097383","https://openalex.org/W2950774332","https://openalex.org/W2963311060","https://openalex.org/W2965085876","https://openalex.org/W3036243698","https://openalex.org/W4256383029","https://openalex.org/W6628261430","https://openalex.org/W6747544890","https://openalex.org/W6762493518"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4379116144","https://openalex.org/W2888014022"],"abstract_inverted_index":{"Recent":[0],"microarchitectural":[1,96],"security":[2,97],"countermeasures":[3,65,94],"by":[4],"employing":[5],"applications'":[6],"low-level":[7],"features":[8],"collected":[9],"from":[10,43,55],"Hardware":[11],"Performance":[12],"Counters":[13],"(HPCs)":[14],"registers":[15],"have":[16,33],"emerged":[17],"as":[18,73,75],"a":[19],"promising":[20],"solution":[21],"to":[22,46,98],"address":[23],"the":[24,39,67,76],"inefficiency":[25],"of":[26,69,88],"traditional":[27],"software-based":[28],"methods.":[29],"Furthermore,":[30],"recent":[31,89],"studies":[32],"shown":[34],"that":[35],"malicious":[36,100],"activities":[37],"at":[38],"hardware":[40,77],"level":[41],"ranging":[42],"application-based":[44],"malware":[45],"microarchitecture-based":[47],"Side-Channel":[48],"Attacks":[49],"(SCAs)":[50],"can":[51],"be":[52],"accurately":[53],"distinguished":[54],"normal":[56],"traces":[57],"using":[58],"Machine":[59],"Learning":[60],"(ML)":[61],"algorithms.":[62],"Such":[63],"ML-based":[64],"reduce":[66],"latency":[68],"attack":[70],"detection":[71],"process":[72],"well":[74],"and":[78,102],"resource":[79],"utilization":[80],"overheads.":[81],"This":[82],"paper":[83],"provides":[84],"an":[85],"in-depth":[86],"analysis":[87],"advancements":[90],"in":[91],"machine":[92],"learning":[93],"for":[95],"detect":[99],"software":[101],"emerging":[103],"side-channel":[104],"attacks.":[105]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
