{"id":"https://openalex.org/W2006929527","doi":"https://doi.org/10.1145/1314276.1314282","title":"Drm to counter side-channel attacks?","display_name":"Drm to counter side-channel attacks?","publication_year":2007,"publication_date":"2007-10-29","ids":{"openalex":"https://openalex.org/W2006929527","doi":"https://doi.org/10.1145/1314276.1314282","mag":"2006929527"},"language":"en","primary_location":{"id":"doi:10.1145/1314276.1314282","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044833739","display_name":"Ryad Benadjila","orcid":null},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Ryad Benadjila","raw_affiliation_strings":["Orange Labs, Issy-les-Moulineaux, France"],"affiliations":[{"raw_affiliation_string":"Orange Labs, Issy-les-Moulineaux, France","institution_ids":["https://openalex.org/I19370010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101779196","display_name":"Olivier Billet","orcid":"https://orcid.org/0000-0002-3742-7169"},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Billet","raw_affiliation_strings":["Orange Labs, Issy-les-Moulineaux, France"],"affiliations":[{"raw_affiliation_string":"Orange Labs, Issy-les-Moulineaux, France","institution_ids":["https://openalex.org/I19370010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069975092","display_name":"Stanislas Francfort","orcid":null},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Stanislas Francfort","raw_affiliation_strings":["Orange Labs, Issy-les-Moulineaux, France"],"affiliations":[{"raw_affiliation_string":"Orange Labs, Issy-les-Moulineaux, France","institution_ids":["https://openalex.org/I19370010"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044833739"],"corresponding_institution_ids":["https://openalex.org/I19370010"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07574602,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.845914363861084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7731258869171143},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7299986481666565},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6658045053482056},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6108924150466919},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.599501371383667},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5561804175376892},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5477719306945801},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.48894062638282776},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.458944708108902},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4438815116882324},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32204878330230713},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29810094833374023},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08411359786987305}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.845914363861084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7731258869171143},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7299986481666565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6658045053482056},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6108924150466919},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.599501371383667},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5561804175376892},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5477719306945801},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.48894062638282776},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.458944708108902},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4438815116882324},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32204878330230713},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29810094833374023},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08411359786987305},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1314276.1314282","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1253017325","https://openalex.org/W1488058190","https://openalex.org/W1488471373","https://openalex.org/W1496265857","https://openalex.org/W1509316335","https://openalex.org/W1511843316","https://openalex.org/W1551572898","https://openalex.org/W1572300106","https://openalex.org/W1572375309","https://openalex.org/W1613874182","https://openalex.org/W1647783008","https://openalex.org/W1917830443","https://openalex.org/W2011257923","https://openalex.org/W2097724213","https://openalex.org/W2107691219","https://openalex.org/W2126132644","https://openalex.org/W2131019288","https://openalex.org/W2148888468","https://openalex.org/W2154909745","https://openalex.org/W2163114293","https://openalex.org/W2242066295","https://openalex.org/W2526223850","https://openalex.org/W3007127761","https://openalex.org/W4285719527","https://openalex.org/W4301009348"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W4242235492","https://openalex.org/W2136687465","https://openalex.org/W2384475851","https://openalex.org/W4237162029","https://openalex.org/W2000444236","https://openalex.org/W2367268135","https://openalex.org/W3016859066"],"abstract_inverted_index":{"In":[0,70],"the":[1,4,12,17,26,43,60,77,90,105,109,146],"DRM":[2,44,68,147],"setting,":[3],"attacker":[5,28,91],"is":[6,22,50,57],"a":[7,67,122],"very":[8],"powerful":[9],"adversary,":[10],"owning":[11],"software":[13],"as":[14,16,118],"well":[15],"underlying":[18],"hardware.":[19],"This":[20],"context":[21],"far":[23],"different":[24],"from":[25,89,145],"black-box":[27,61],"commonly":[29],"considered":[30],"in":[31,87,126],"conventional":[32],"cryptography.Therefore,":[33],"cryptographers":[34],"have":[35],"tried":[36],"to":[37,95],"design":[38],"new":[39],"cryptographic":[40],"tools":[41],"fitting":[42],"requirements.":[45],"A":[46],"related":[47],"issuein":[48],"cryptography":[49],"that":[51,76,131],"of":[52,79,121,134],"side-channel":[53,80,140],"attacks,":[54],"where":[55],"theattacker":[56],"stronger":[58],"than":[59,66],"attacker,":[62],"but":[63],"usually":[64],"weaker":[65],"attacker.":[69],"this":[71,96],"paper,":[72],"we":[73],"aim":[74],"toshow":[75],"study":[78],"attacks":[81,107,141],"can":[82,115],"benefit":[83],"fromDRM":[84],"research,":[85],"and":[86],"particular":[88],"modelsand":[92],"solutions":[93],"tailored":[94],"specific":[97,102],"setting.":[98,128,148],"We":[99,129],"focus":[100],"ona":[101],"issue,":[103],"namely":[104],"cache":[106],"against":[108,138],"AES,and":[110],"show":[111],"how":[112],"current":[113],"counter-measures":[114,135],"be":[116],"seen":[117],"restricted":[119],"versions":[120],"previous":[123],"protection":[124],"proposed":[125],"theDRM":[127],"demonstrate":[130],"those":[132],"kind":[133],"are":[136],"weak":[137],"cache-based":[139],"by":[142],"reusing":[143],"results":[144]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
