{"id":"https://openalex.org/W2956231146","doi":"https://doi.org/10.1109/tifs.2019.2929018","title":"Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor","display_name":"Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor","publication_year":2019,"publication_date":"2019-07-15","ids":{"openalex":"https://openalex.org/W2956231146","doi":"https://doi.org/10.1109/tifs.2019.2929018","mag":"2956231146"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2929018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2929018","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089665637","display_name":"Baki Berkay Yilmaz","orcid":"https://orcid.org/0000-0001-6796-5112"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Baki Berkay Yilmaz","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992397","display_name":"Milos Prvulovi\u0107","orcid":"https://orcid.org/0000-0002-5955-277X"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Prvulovic","raw_affiliation_strings":["School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018695384","display_name":"Alenka Zaji\u0107","orcid":"https://orcid.org/0000-0003-1158-3785"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alenka Zajic","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089665637"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":2.0259,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.90053815,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"776","last_page":"789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8736040592193604},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6553928852081299},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.639641284942627},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6223059892654419},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5421924591064453},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.5205793976783752},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46473240852355957},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.43205755949020386},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4168429970741272},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3819189965724945},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33783280849456787},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33623164892196655},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21068382263183594},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20142388343811035},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13203009963035583},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09418827295303345}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8736040592193604},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6553928852081299},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.639641284942627},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6223059892654419},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5421924591064453},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.5205793976783752},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46473240852355957},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.43205755949020386},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4168429970741272},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3819189965724945},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33783280849456787},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33623164892196655},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21068382263183594},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20142388343811035},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13203009963035583},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09418827295303345},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2929018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2929018","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6259045414","display_name":null,"funder_award_id":"FA8650-16-C-7620","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G6602338365","display_name":null,"funder_award_id":"1563991","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W192266324","https://openalex.org/W1230022372","https://openalex.org/W1511843316","https://openalex.org/W1519539754","https://openalex.org/W1537704588","https://openalex.org/W1548656471","https://openalex.org/W1558247033","https://openalex.org/W1560720671","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1752847028","https://openalex.org/W1886640579","https://openalex.org/W1897761346","https://openalex.org/W1995875735","https://openalex.org/W2017472771","https://openalex.org/W2025849355","https://openalex.org/W2039319436","https://openalex.org/W2052623322","https://openalex.org/W2074437394","https://openalex.org/W2079814843","https://openalex.org/W2096050104","https://openalex.org/W2117290716","https://openalex.org/W2117552728","https://openalex.org/W2119516411","https://openalex.org/W2123052937","https://openalex.org/W2125378579","https://openalex.org/W2128255161","https://openalex.org/W2133469632","https://openalex.org/W2148862943","https://openalex.org/W2156710265","https://openalex.org/W2166293920","https://openalex.org/W2167082268","https://openalex.org/W2170120409","https://openalex.org/W2172060328","https://openalex.org/W2183849663","https://openalex.org/W2295831925","https://openalex.org/W2330270191","https://openalex.org/W2762996005","https://openalex.org/W2763035067","https://openalex.org/W2888810434","https://openalex.org/W2890787639","https://openalex.org/W2908466675","https://openalex.org/W2944942867","https://openalex.org/W2951040622","https://openalex.org/W2953160047","https://openalex.org/W3101276979","https://openalex.org/W3121420921","https://openalex.org/W4241773843","https://openalex.org/W6607899610","https://openalex.org/W6627969867","https://openalex.org/W6632355284","https://openalex.org/W6633675652","https://openalex.org/W6678591436"],"related_works":["https://openalex.org/W2791034507","https://openalex.org/W2769734684","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2022533428","https://openalex.org/W1796231437","https://openalex.org/W2903787673","https://openalex.org/W3028997697","https://openalex.org/W2583594538","https://openalex.org/W2969678054"],"abstract_inverted_index":{"The":[0,109],"side-channel":[1,45,49],"leakage":[2,21,29,160],"is":[3,22],"a":[4,10,23,37,60,62,65,68,77,104,137,154,174,190],"consequence":[5],"of":[6,55,57,92,106,162,169,171],"program":[7,41,74],"execution":[8,18,42,54,168],"in":[9,26,67,76,173],"computer":[11],"processor,":[12],"and":[13,19,30,47,147,188],"understanding":[14],"relationship":[15,139],"between":[16,140],"code":[17],"information":[20,28,50],"necessary":[24],"step":[25],"estimating":[27],"its":[31],"capacity":[32,51,161],"limits.":[33],"This":[34],"paper":[35],"proposes":[36],"methodology":[38],"to":[39,43,81,181],"relate":[40],"electromagnetic":[44,111],"emanations":[46],"estimates":[48],"created":[52,166],"by":[53,167],"series":[56,170],"instructions":[58,75,93,99,172],"(e.g.,":[59],"function,":[61],"procedure,":[63],"or":[64],"program)":[66],"processor.":[69,108,175],"To":[70,126],"model":[71],"dependence":[72],"among":[73,90,98],"code,":[78],"we":[79,135,157,177],"propose":[80],"use":[82],"Markov":[83],"source":[84],"model,":[85,134],"which":[86],"includes":[87],"the":[88,107,121,124,128,132,141,159],"dependencies":[89,97],"sequence":[91],"as":[94,96,100],"well":[95],"they":[101],"pass":[102],"through":[103],"pipeline":[105],"emitted":[110],"(EM)":[112],"signals":[113],"during":[114],"instruction":[115,143],"executions":[116],"are":[117],"natural":[118],"choice":[119],"for":[120,131],"inputs":[122,130],"into":[123],"model.":[125],"obtain":[127,194],"channel":[129],"proposed":[133],"derive":[136,158],"mathematical":[138],"emanated":[142,149],"signal":[144,150],"power":[145,151],"(ESP)":[146],"total":[148],"while":[152],"running":[153],"program.":[155],"Then,":[156],"EM":[163],"side":[164],"channels":[165],"Finally,":[176],"provide":[178],"experimental":[179],"results":[180],"demonstrate":[182],"that":[183,189],"leakages":[184],"could":[185,193],"be":[186],"severe":[187],"dedicated":[191],"attacker":[192],"important":[195],"information.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
