{"id":"https://openalex.org/W2762996005","doi":"https://doi.org/10.1109/tifs.2017.2762826","title":"Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor","display_name":"Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2762996005","doi":"https://doi.org/10.1109/tifs.2017.2762826","mag":"2762996005"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2762826","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tifs.2017.2762826","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089665637","display_name":"Baki Berkay Yilmaz","orcid":"https://orcid.org/0000-0001-6796-5112"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Baki Berkay Yilmaz","raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010204308","display_name":"Robert Callan","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert L. Callan","raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992397","display_name":"Milos Prvulovic","orcid":"https://orcid.org/0000-0002-5955-277X"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Prvulovic","raw_affiliation_string":"Sch. of Comput. Sci., Georgia Inst. of Technol., Atlanta, GA, USA","raw_affiliation_strings":["Sch. of Comput. Sci., Georgia Inst. of Technol., Atlanta, GA, USA"]},{"author_position":"last","author":{"id":"https://openalex.org/A5018695384","display_name":"Alenka Zaji\u0107","orcid":"https://orcid.org/0000-0003-1158-3785"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alenka Zajic","raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":29,"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"13","issue":"3","first_page":"605","last_page":"620"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"em covert/side-channel","score":0.5191},{"keyword":"processor","score":0.452},{"keyword":"execution","score":0.33},{"keyword":"capacity","score":0.2622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8763447},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7491214},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7235741},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6551755},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.63708174},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.57373625},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.53763294},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.44421393},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.43198687},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4209587},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38108373},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17185962},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13933736},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13434985},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1299057},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.093399584},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2762826","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2762826","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency","award_id":"FA8650-16-C-7620"},{"funder":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations","award_id":"1563991"},{"funder":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations","award_id":"1318934"},{"funder":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research","award_id":"FA9550-14-1-0223"}],"referenced_works_count":26,"referenced_works":["https://openalex.org/W1534397823","https://openalex.org/W1548656471","https://openalex.org/W1613874182","https://openalex.org/W1897761346","https://openalex.org/W1959279725","https://openalex.org/W2017472771","https://openalex.org/W2025849355","https://openalex.org/W2039319436","https://openalex.org/W2074437394","https://openalex.org/W2079814843","https://openalex.org/W2096050104","https://openalex.org/W2098407174","https://openalex.org/W2099137371","https://openalex.org/W2117290716","https://openalex.org/W2117552728","https://openalex.org/W2119516411","https://openalex.org/W2123052937","https://openalex.org/W2148862943","https://openalex.org/W2156710265","https://openalex.org/W2166293920","https://openalex.org/W2167082268","https://openalex.org/W2183849663","https://openalex.org/W2208250432","https://openalex.org/W2295831925","https://openalex.org/W2330270191","https://openalex.org/W2978725006"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W789579324","https://openalex.org/W2092798601","https://openalex.org/W2769734684","https://openalex.org/W2580249689","https://openalex.org/W4293162529","https://openalex.org/W4239080508"],"ngrams_url":"https://api.openalex.org/works/W2762996005/ngrams","abstract_inverted_index":{"The":[0],"goal":[1],"of":[2,16,19,51,93,109,148],"this":[3,73,122],"paper":[4],"is":[5,11],"to":[6,65,80,124,139],"answer":[7,72],"how":[8],"much":[9],"information":[10,43,84],"\u201ctransmitted\u201d":[12],"by":[13,90,100,145],"the":[14,82,91,113,126,146],"execution":[15,92,147],"particular":[17],"sequence":[18],"instructions":[20,94,111,149],"in":[21,95,150,157],"a":[22,26,52,77,96,102,136,151],"processor.":[23,97],"Introducing":[24],"such":[25],"measure":[27,123],"would":[28,46],"provide":[29],"quantitative":[30],"guidance":[31],"for":[32,130],"designing":[33],"programs":[34],"and":[35,45,112,153],"computer":[36,159],"hardware":[37,55],"that":[38,57],"minimizes":[39],"inadvertent":[40],"(side":[41],"channel)":[42],"leakage,":[44],"also":[47],"help":[48],"detect":[49],"parts":[50],"program":[53],"or":[54],"design":[56],"have":[58],"unusually":[59],"high":[60],"leakage":[61,85],"(i.e.,":[62],"were":[63],"designed":[64],"function":[66],"as":[67],"covert":[68],"channel":[69,142],"\u201ctransmitters\u201d).":[70],"To":[71],"question,":[74],"we":[75,120,134],"propose":[76,135],"new":[78,137],"method":[79,138],"estimate":[81,140],"maximum":[83],"through":[86],"EM":[87],"signals":[88],"generated":[89],"We":[98],"start":[99],"deriving":[101],"mathematical":[103],"relationship":[104],"between":[105],"electromagnetic":[106],"side-channel":[107,116],"energy":[108],"individual":[110],"measured":[114],"pairwise":[115],"signal":[117],"power.":[118],"Then,":[119],"use":[121],"calculate":[125],"transition":[127],"probabilities":[128],"needed":[129],"estimating":[131],"capacity.":[132],"Finally,":[133],"side/covert":[141],"capacity":[143],"created":[144],"processor":[152],"illustrate":[154],"our":[155],"results":[156],"several":[158],"systems.":[160]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2762996005","counts_by_year":[{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":1}],"updated_date":"2024-03-16T01:41:38.507421","created_date":"2017-10-20"}