{"id":"https://openalex.org/W2553107868","doi":"https://doi.org/10.1109/tdsc.2016.2631548","title":"Copker: A Cryptographic Engine Against Cold-Boot Attacks","display_name":"Copker: A Cryptographic Engine Against Cold-Boot Attacks","publication_year":2016,"publication_date":"2016-11-23","ids":{"openalex":"https://openalex.org/W2553107868","doi":"https://doi.org/10.1109/tdsc.2016.2631548","mag":"2553107868"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2631548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2631548","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057991555","display_name":"Le Guan","orcid":"https://orcid.org/0000-0002-8205-5616"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Le Guan","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037021459","display_name":"Ziqiang Ma","orcid":"https://orcid.org/0000-0002-1497-8427"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziqiang Ma","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052233895","display_name":"Bo Luo","orcid":"https://orcid.org/0000-0001-8196-2436"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Luo","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Kansas, Lawrence, KS"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Kansas, Lawrence, KS","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037919131","display_name":"Luning Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luning Xia","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033745290","display_name":"Jiwu Jing","orcid":"https://orcid.org/0000-0002-3409-6149"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Jing","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5057991555"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":2.1424,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.9087651,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":"5","first_page":"742","last_page":"754"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7789888381958008},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7055328488349915},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6465297341346741},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6073381900787354},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5094779133796692},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4771423041820526},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4655597507953644},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.4527941942214966},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38635706901550293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36573895812034607},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34463751316070557},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.31886738538742065},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.26272284984588623}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789888381958008},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7055328488349915},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6465297341346741},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6073381900787354},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5094779133796692},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4771423041820526},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4655597507953644},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.4527941942214966},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38635706901550293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36573895812034607},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34463751316070557},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.31886738538742065},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.26272284984588623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2016.2631548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2631548","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W44853875","https://openalex.org/W120141331","https://openalex.org/W161094530","https://openalex.org/W1427174644","https://openalex.org/W1493190345","https://openalex.org/W1505973206","https://openalex.org/W1514794536","https://openalex.org/W1527059802","https://openalex.org/W1551572898","https://openalex.org/W1553586369","https://openalex.org/W1565369953","https://openalex.org/W1569778844","https://openalex.org/W1583301963","https://openalex.org/W1824405704","https://openalex.org/W1852007091","https://openalex.org/W1880212920","https://openalex.org/W1934458198","https://openalex.org/W1976476866","https://openalex.org/W1986468587","https://openalex.org/W1987221145","https://openalex.org/W1992291252","https://openalex.org/W1996360405","https://openalex.org/W2004814164","https://openalex.org/W2013716714","https://openalex.org/W2025849355","https://openalex.org/W2051384716","https://openalex.org/W2061643296","https://openalex.org/W2067861590","https://openalex.org/W2097128585","https://openalex.org/W2101774955","https://openalex.org/W2105112969","https://openalex.org/W2107691219","https://openalex.org/W2119028650","https://openalex.org/W2131202839","https://openalex.org/W2136310957","https://openalex.org/W2144183173","https://openalex.org/W2149256534","https://openalex.org/W2159054268","https://openalex.org/W2167804035","https://openalex.org/W2168872572","https://openalex.org/W2170138789","https://openalex.org/W2170961388","https://openalex.org/W2175377689","https://openalex.org/W2397035252","https://openalex.org/W2510286124","https://openalex.org/W2896599519","https://openalex.org/W2949139536","https://openalex.org/W3044061836","https://openalex.org/W4232836212","https://openalex.org/W4237773356","https://openalex.org/W4243202529","https://openalex.org/W6601874640","https://openalex.org/W6606453090","https://openalex.org/W6628261430","https://openalex.org/W6630318109","https://openalex.org/W6630953884","https://openalex.org/W6632933420","https://openalex.org/W6633219538","https://openalex.org/W6633902989","https://openalex.org/W6634294492","https://openalex.org/W6634781821","https://openalex.org/W6638342779","https://openalex.org/W6653721086","https://openalex.org/W6679268441","https://openalex.org/W6683151363","https://openalex.org/W6763419664"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W2782833818","https://openalex.org/W1990743860","https://openalex.org/W3191743943","https://openalex.org/W4226182343","https://openalex.org/W4303856864","https://openalex.org/W2332531239","https://openalex.org/W3213981908","https://openalex.org/W2260005205"],"abstract_inverted_index":{"Cryptosystems":[0],"are":[1,27,128,198],"essential":[2],"for":[3],"computer":[4],"and":[5,16,29,35,87,89,116,146,187,203],"communication":[6],"security,":[7],"e.g.,":[8],"RSA":[9,86],"or":[10],"ECDSA":[11,97],"in":[12,18,31,77,96,120,135,149,161,170],"PGP":[13],"Email":[14],"clients":[15],"AES":[17],"full":[19],"disk":[20],"encryption.":[21],"In":[22,99,137],"practice,":[23],"the":[24,42,69,81,110,113,138,157,167,171,178],"cryptographic":[25,61,195],"keys":[26,145],"loaded":[28],"stored":[30],"RAM":[32,46],"as":[33],"plain-text,":[34],"therefore":[36],"vulnerable":[37],"to":[38,48,155],"cold-boot":[39,201],"attacks":[40,202],"exploiting":[41],"remanence":[43],"effect":[44],"of":[45,106,180],"chips":[47],"directly":[49],"read":[50],"memory":[51],"data.":[52],"To":[53],"tackle":[54],"this":[55],"problem,":[56],"we":[57,190],"propose":[58],"Copker,":[59],"a":[60],"engine":[62],"that":[63,192,197],"implements":[64],"asymmetric":[65,83],"cryptosystems":[66,84],"entirely":[67],"within":[68],"CPU,":[70],"without":[71,130],"storing":[72,131],"any":[73,132],"plain-text":[74],"sensitive":[75,107,133],"data":[76],"RAM.":[78,136],"Copker":[79,103,141,165,176,193],"supports":[80],"popular":[82],"(i.e.,":[85],"ECDSA),":[88],"deterministic":[90],"random":[91],"bit":[92],"generators":[93],"(DRBGs)":[94],"used":[95],"signing.":[98],"its":[100],"active":[101],"mode,":[102,140],"stores":[104,142],"kilobytes":[105],"data,":[108],"including":[109],"private":[111,144,182],"key,":[112],"DRBG":[114,147],"seed":[115],"intermediate":[117],"states,":[118],"only":[119],"on-chip":[121],"CPU":[122,162],"caches":[123],"(and":[124],"registers).":[125],"Decryption/signing":[126],"operations":[127],"performed":[129],"information":[134],"suspend":[139,172],"symmetrically-encrypted":[143],"seeds":[148],"memory,":[150],"while":[151],"employs":[152],"existing":[153],"solutions":[154],"keep":[156],"key-encryption":[158],"key":[159],"securely":[160],"registers.":[163],"Hence,":[164],"releases":[166],"system":[168],"resources":[169],"mode.":[173],"We":[174],"implement":[175],"with":[177],"support":[179],"multiple":[181],"keys.":[183],"With":[184],"security":[185],"analyses":[186],"intensive":[188],"experiments,":[189],"demonstrate":[191],"provides":[194],"services":[196],"secure":[199],"against":[200],"introduce":[204],"reasonable":[205],"overhead.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
