{"id":"https://openalex.org/W2038554971","doi":"https://doi.org/10.1145/2487222.2487224","title":"Leakage Mapping","display_name":"Leakage Mapping","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2038554971","doi":"https://doi.org/10.1145/2487222.2487224","mag":"2038554971"},"language":"en","primary_location":{"id":"doi:10.1145/2487222.2487224","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2487222.2487224","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059739534","display_name":"William E. Cobb","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"William E. Cobb","raw_affiliation_strings":["Air Force Institute of Technology","Air Force institute of Technology"],"affiliations":[{"raw_affiliation_string":"Air Force Institute of Technology","institution_ids":[]},{"raw_affiliation_string":"Air Force institute of Technology","institution_ids":["https://openalex.org/I55061410"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112775921","display_name":"Rusty O. Baldwin","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rusty O. Baldwin","raw_affiliation_strings":["Air Force Institute of Technology","Air Force institute of Technology"],"affiliations":[{"raw_affiliation_string":"Air Force Institute of Technology","institution_ids":[]},{"raw_affiliation_string":"Air Force institute of Technology","institution_ids":["https://openalex.org/I55061410"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052369963","display_name":"Eric D. Laspe","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric D. Laspe","raw_affiliation_strings":["Air Force Institute of Technology","Air Force institute of Technology"],"affiliations":[{"raw_affiliation_string":"Air Force Institute of Technology","institution_ids":[]},{"raw_affiliation_string":"Air Force institute of Technology","institution_ids":["https://openalex.org/I55061410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059739534"],"corresponding_institution_ids":["https://openalex.org/I55061410"],"apc_list":null,"apc_paid":null,"fwci":1.4428,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85592768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"1","first_page":"1","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822147607803345},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7143081426620483},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6695113182067871},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6554424166679382},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.6053370833396912},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.5700910687446594},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.4902411103248596},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.45495668053627014},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4292118549346924},{"id":"https://openalex.org/keywords/univariate","display_name":"Univariate","score":0.4234945774078369},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41547033190727234},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34478724002838135},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3232933282852173},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13891896605491638},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.13701844215393066},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.13138648867607117},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.08806058764457703},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.08764255046844482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822147607803345},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7143081426620483},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6695113182067871},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6554424166679382},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.6053370833396912},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.5700910687446594},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.4902411103248596},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.45495668053627014},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4292118549346924},{"id":"https://openalex.org/C199163554","wikidata":"https://www.wikidata.org/wiki/Q1681619","display_name":"Univariate","level":3,"score":0.4234945774078369},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41547033190727234},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34478724002838135},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3232933282852173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13891896605491638},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.13701844215393066},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.13138648867607117},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.08806058764457703},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.08764255046844482},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2487222.2487224","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2487222.2487224","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W59374396","https://openalex.org/W200116028","https://openalex.org/W1491708407","https://openalex.org/W1499081748","https://openalex.org/W1519064427","https://openalex.org/W1562542037","https://openalex.org/W1572300106","https://openalex.org/W1598124977","https://openalex.org/W1602453119","https://openalex.org/W1605426304","https://openalex.org/W1607006990","https://openalex.org/W1611613623","https://openalex.org/W1631035314","https://openalex.org/W1702900248","https://openalex.org/W1713617955","https://openalex.org/W1719933076","https://openalex.org/W1752847028","https://openalex.org/W1774054610","https://openalex.org/W1794592934","https://openalex.org/W1862426464","https://openalex.org/W1976842305","https://openalex.org/W2113952909","https://openalex.org/W2118587827","https://openalex.org/W2129356722","https://openalex.org/W2154909745","https://openalex.org/W2163432699","https://openalex.org/W2170489924","https://openalex.org/W2177288330","https://openalex.org/W2248552015","https://openalex.org/W2403881763","https://openalex.org/W2561675875","https://openalex.org/W2738744825","https://openalex.org/W4236706032"],"related_works":["https://openalex.org/W2008960744","https://openalex.org/W2105471374","https://openalex.org/W2963549154","https://openalex.org/W2158117886","https://openalex.org/W1987803429","https://openalex.org/W1582340598","https://openalex.org/W2152162311","https://openalex.org/W1530654122","https://openalex.org/W2182731056","https://openalex.org/W3013281356"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2],"generalized":[3],"framework":[4],"to":[5,47],"evaluate":[6],"the":[7,20,41,48,62,74,98],"side-channel":[8,54,89],"information":[9,29],"leakage":[10,16,35,69],"of":[11,27,44,51,76,97],"symmetric":[12],"block":[13],"ciphers.":[14],"The":[15,37,80],"mapping":[17],"methodology":[18],"enables":[19],"systematic":[21],"and":[22,25,66],"efficient":[23],"identification":[24],"mitigation":[26],"problematic":[28],"leakages":[30],"by":[31],"exhaustively":[32],"considering":[33],"relevant":[34],"models.":[36,79],"evaluation":[38,81],"procedure":[39],"bounds":[40],"anticipated":[42],"resistance":[43],"an":[45],"implementation":[46],"general":[49],"class":[50],"univariate":[52],"differential":[53,88],"analysis":[55,90],"techniques.":[56],"Typical":[57],"applications":[58],"are":[59,83],"demonstrated":[60],"using":[61],"well-known":[63],"Hamming":[64,67],"weight":[65],"distance":[68],"models,":[70],"with":[71],"recommendations":[72],"for":[73],"incorporation":[75],"more":[77],"accurate":[78],"results":[82],"empirically":[84],"validated":[85],"against":[86],"correlation-based":[87],"attacks":[91],"on":[92],"two":[93],"typical":[94],"unprotected":[95],"implementations":[96],"Advanced":[99],"Encryption":[100],"Standard.":[101]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
