{"id":"https://openalex.org/W2175639829","doi":"https://doi.org/10.1109/hpcc-css-icess.2015.257","title":"User-Level Side Channel Attack on Workflow System in Data-Center","display_name":"User-Level Side Channel Attack on Workflow System in Data-Center","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2175639829","doi":"https://doi.org/10.1109/hpcc-css-icess.2015.257","mag":"2175639829"},"language":"en","primary_location":{"id":"doi:10.1109/hpcc-css-icess.2015.257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcc-css-icess.2015.257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038618940","display_name":"Jihe Wang","orcid":"https://orcid.org/0000-0003-0499-0999"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jihe Wang","raw_affiliation_strings":["Computer Science College Sichuan University, Chengdu, SC, China"],"affiliations":[{"raw_affiliation_string":"Computer Science College Sichuan University, Chengdu, SC, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083330935","display_name":"Meikang Qiu","orcid":"https://orcid.org/0000-0002-1004-0140"},"institutions":[{"id":"https://openalex.org/I126863827","display_name":"Pace University","ror":"https://ror.org/047p7y759","country_code":"US","type":"education","lineage":["https://openalex.org/I126863827"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meikang Qiu","raw_affiliation_strings":["Seidenberg School of Computer Science and Information Systems Pace University, Manhattan, NY, USA"],"affiliations":[{"raw_affiliation_string":"Seidenberg School of Computer Science and Information Systems Pace University, Manhattan, NY, USA","institution_ids":["https://openalex.org/I126863827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022121427","display_name":"Bing Guo","orcid":"https://orcid.org/0000-0002-0679-4601"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Guo","raw_affiliation_strings":["Computer Science College Sichuan University, Chengdu, SC, China"],"affiliations":[{"raw_affiliation_string":"Computer Science College Sichuan University, Chengdu, SC, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013074509","display_name":"Yan Shen","orcid":"https://orcid.org/0009-0000-1536-979X"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Shen","raw_affiliation_strings":["School of Control Engineering Chengdu University of Information Technology, Chengdu, SC, China"],"affiliations":[{"raw_affiliation_string":"School of Control Engineering Chengdu University of Information Technology, Chengdu, SC, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100663298","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0002-0275-4987"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Li","raw_affiliation_strings":["Computer Science College Sichuan University, Chengdu, SC, China"],"affiliations":[{"raw_affiliation_string":"Computer Science College Sichuan University, Chengdu, SC, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038618940"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76602712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"20","issue":null,"first_page":"1430","last_page":"1435"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8207951188087463},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.7493318319320679},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5855844616889954},{"id":"https://openalex.org/keywords/workflow-engine","display_name":"Workflow engine","score":0.5327078700065613},{"id":"https://openalex.org/keywords/workflow-technology","display_name":"Workflow technology","score":0.4498906135559082},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.44609832763671875},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.4239421486854553},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.39894989132881165},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3628993034362793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30503422021865845},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16822761297225952},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08194667100906372}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8207951188087463},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.7493318319320679},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5855844616889954},{"id":"https://openalex.org/C188220564","wikidata":"https://www.wikidata.org/wiki/Q3325097","display_name":"Workflow engine","level":3,"score":0.5327078700065613},{"id":"https://openalex.org/C19612761","wikidata":"https://www.wikidata.org/wiki/Q8034836","display_name":"Workflow technology","level":3,"score":0.4498906135559082},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.44609832763671875},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.4239421486854553},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.39894989132881165},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3628993034362793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30503422021865845},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16822761297225952},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08194667100906372},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcc-css-icess.2015.257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcc-css-icess.2015.257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W262970172","https://openalex.org/W2027860831","https://openalex.org/W2056936702","https://openalex.org/W2081023473","https://openalex.org/W2087064593","https://openalex.org/W2088216519","https://openalex.org/W2122465391","https://openalex.org/W2165464232","https://openalex.org/W2404098708","https://openalex.org/W2533399023","https://openalex.org/W4229926342","https://openalex.org/W6609634455","https://openalex.org/W6713547331"],"related_works":["https://openalex.org/W1998651692","https://openalex.org/W2356466503","https://openalex.org/W2049143847","https://openalex.org/W2370201914","https://openalex.org/W2368797771","https://openalex.org/W2352774566","https://openalex.org/W2387628393","https://openalex.org/W2376671203","https://openalex.org/W2054854316","https://openalex.org/W2356038787"],"abstract_inverted_index":{"Though":[0],"current":[1],"workflow":[2,25,55,63],"systems,":[3,26],"known":[4],"as":[5,28,74],"the":[6,22,60,98],"major":[7],"task":[8],"managing":[9],"tool":[10],"in":[11,24],"data-center,":[12],"use":[13],"UNIX-based":[14],"user/group":[15],"authorization":[16],"mechanisms":[17],"to":[18,37,53,96],"defend":[19],"unauthorized":[20],"operations,":[21],"information":[23],"such":[27,73],"DAG":[29,61],"(Directed":[30],"Acyclic":[31],"Graph),":[32],"could":[33],"be":[34,66],"easily":[35],"exposed":[36],"any":[38],"user-level":[39],"malicious":[40],"monitor.":[41],"In":[42],"this":[43,58],"paper,":[44],"we":[45,90],"propose":[46],"a":[47,92],"type":[48],"of":[49,62],"side":[50],"channel":[51],"attack":[52],"data-center":[54],"information.":[56],"By":[57],"attack,":[59],"systems":[64],"can":[65,83],"stolen":[67],"through":[68],"monitoring":[69],"basic":[70],"system":[71],"characteristics,":[72],"CPU":[75],"utilization,":[76],"memory":[77],"accessing,":[78],"disk":[79],"I/O,":[80],"etc,":[81],"which":[82],"successfully":[84],"circumvents":[85],"UNIX":[86],"privilege":[87],"checking.":[88],"Also,":[89],"present":[91],"software-diversity":[93],"based":[94],"measurecounter":[95],"mitigate":[97],"attack.":[99]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
