{"id":"https://openalex.org/W4393380922","doi":"https://doi.org/10.1109/tcc.2024.3383661","title":"Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains","display_name":"Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains","publication_year":2024,"publication_date":"2024-04-01","ids":{"openalex":"https://openalex.org/W4393380922","doi":"https://doi.org/10.1109/tcc.2024.3383661"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2024.3383661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3383661","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101908672","display_name":"Yang Shi","orcid":"https://orcid.org/0000-0003-3905-2257"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Shi","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119607067","display_name":"Yimin Li","orcid":"https://orcid.org/0009-0008-9301-4220"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yimin Li","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107171106","display_name":"T. Luo","orcid":"https://orcid.org/0009-0002-3234-4230"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyuan Luo","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107172767","display_name":"Xiong Jiang","orcid":"https://orcid.org/0009-0003-6106-8834"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Jiang","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081507644","display_name":"Bowen Du","orcid":"https://orcid.org/0000-0002-3755-4870"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bowen Du","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005634549","display_name":"Hongfei Fan","orcid":"https://orcid.org/0000-0002-0352-9730"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongfei Fan","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101908672"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":1.0878,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79464001,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"12","issue":"2","first_page":"625","last_page":"643"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7949225902557373},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7042739391326904},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7002728581428528},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6917983293533325},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5696539282798767},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.433709979057312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4119834303855896},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33332517743110657},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20371246337890625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16243374347686768},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.12161561846733093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7949225902557373},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7042739391326904},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7002728581428528},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6917983293533325},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5696539282798767},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.433709979057312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4119834303855896},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33332517743110657},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20371246337890625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16243374347686768},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.12161561846733093}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2024.3383661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3383661","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G1719052258","display_name":null,"funder_award_id":"21ZR1465100","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G2147939732","display_name":null,"funder_award_id":"61702374","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5642009191","display_name":null,"funder_award_id":"62172301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8253333954","display_name":null,"funder_award_id":"61772371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W192760154","https://openalex.org/W207125177","https://openalex.org/W319967766","https://openalex.org/W1461455889","https://openalex.org/W1505973206","https://openalex.org/W1554705736","https://openalex.org/W1567827377","https://openalex.org/W2015388549","https://openalex.org/W2035712520","https://openalex.org/W2108834246","https://openalex.org/W2126197338","https://openalex.org/W2137083029","https://openalex.org/W2146567535","https://openalex.org/W2148888468","https://openalex.org/W2152144666","https://openalex.org/W2294921903","https://openalex.org/W2557103463","https://openalex.org/W2586920801","https://openalex.org/W2591728819","https://openalex.org/W2604789199","https://openalex.org/W2810584084","https://openalex.org/W2834836963","https://openalex.org/W2925685215","https://openalex.org/W2949317607","https://openalex.org/W2963311060","https://openalex.org/W2976763854","https://openalex.org/W2986666149","https://openalex.org/W2999057964","https://openalex.org/W3004850737","https://openalex.org/W3008872115","https://openalex.org/W3019423257","https://openalex.org/W3036243698","https://openalex.org/W3096664316","https://openalex.org/W3104290553","https://openalex.org/W3107069083","https://openalex.org/W3112409568","https://openalex.org/W3152901657","https://openalex.org/W3211301023","https://openalex.org/W3211385142","https://openalex.org/W6633172130","https://openalex.org/W6753443810","https://openalex.org/W6764039412","https://openalex.org/W6766773006","https://openalex.org/W6783181973","https://openalex.org/W6799842772","https://openalex.org/W6999987195"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2356622127","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2596984206"],"abstract_inverted_index":{"In":[0],"cloud":[1,9,170],"computing":[2],"environments,":[3],"virtual":[4],"machines":[5],"(VMs)":[6],"running":[7],"on":[8,169],"servers":[10],"are":[11],"vulnerable":[12],"to":[13,74,94,144],"shared":[14,121,145],"cache":[15,122,146],"attacks,":[16,147],"such":[17,64,85],"as":[18,40,65,172,174],"Spectre":[19],"and":[20,140,181],"Foreshadow.":[21],"By":[22],"exploiting":[23],"memory":[24,119],"sharing":[25],"among":[26],"VMs,":[27],"these":[28],"attacks":[29],"can":[30,104],"compromise":[31],"cryptographic":[32,62,98],"keys":[33],"in":[34,120,136],"software":[35],"modules.":[36],"Program":[37],"obfuscation":[38,81,158],"serves":[39],"a":[41,49,86,91,115],"promising":[42],"countermeasure":[43],"against":[44],"key":[45],"compromises":[46],"by":[47],"transforming":[48],"program":[50],"into":[51],"an":[52,150],"unintelligent":[53],"form":[54],"while":[55],"preserving":[56],"its":[57,141,175],"functionality.":[58],"Unfortunately,":[59],"for":[60,97,159],"certain":[61],"algorithms":[63,99],"the":[66,106,111,125,129,165],"digital":[67],"signature":[68],"schemes,":[69],"it":[70],"is":[71],"extremely":[72],"difficult":[73],"construct":[75,95,149],"provably":[76],"secure":[77],"obfuscators":[78,96],"using":[79,156],"traditional":[80],"approaches.":[82],"To":[83],"address":[84],"challenge,":[87],"this":[88],"study":[89],"proposes":[90],"novel":[92],"approach":[93],"named":[100],"space-hard":[101,157],"obfuscation,":[102],"which":[103],"mitigate":[105],"threats":[107],"from":[108],"adversaries":[109],"with":[110,153,178],"capability":[112],"of":[113,118,128],"acquiring":[114],"limited":[116],"size":[117],"attacks.":[123],"Considering":[124],"extensive":[126],"use":[127],"Elliptic":[130],"Curve":[131],"Digital":[132],"Signature":[133],"Algorithm":[134],"(ECDSA)":[135],"cloud-based":[137],"Blockchain-as-a-Service":[138],"(BaaS)":[139],"potential":[142],"vulnerability":[143],"we":[148],"exemplary":[151],"scheme":[152],"provable":[154],"security":[155],"ECDSA.":[160],"Experimental":[161],"results":[162],"have":[163],"demonstrated":[164],"scheme's":[166],"high":[167],"efficiency":[168],"servers,":[171],"well":[173],"successful":[176],"integration":[177],"Hyperledger":[179],"Fabric":[180],"Ethereum,":[182],"two":[183],"widely":[184],"used":[185],"blockchain":[186],"systems.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
