{"id":"https://openalex.org/W2516285842","doi":"https://doi.org/10.1145/2976749.2978372","title":"Hypnoguard","display_name":"Hypnoguard","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2516285842","doi":"https://doi.org/10.1145/2976749.2978372","mag":"2516285842"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978372","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075517496","display_name":"Lianying Zhao","orcid":"https://orcid.org/0000-0002-6376-4062"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Lianying Zhao","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055898168","display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075517496"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":2.6504,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92124964,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"945","last_page":"957"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7598594427108765},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6944184303283691},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6352712512016296},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5958405137062073},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5257278680801392},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5108175277709961},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.47927233576774597},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45634469389915466},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4193771779537201},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34163206815719604},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3261783719062805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7598594427108765},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6944184303283691},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6352712512016296},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5958405137062073},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5257278680801392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5108175277709961},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.47927233576774597},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45634469389915466},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4193771779537201},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34163206815719604},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3261783719062805}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978372","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W19255610","https://openalex.org/W70331077","https://openalex.org/W86854724","https://openalex.org/W169290973","https://openalex.org/W202818326","https://openalex.org/W1553586369","https://openalex.org/W1593676544","https://openalex.org/W1736607886","https://openalex.org/W1986468587","https://openalex.org/W1995727142","https://openalex.org/W2008867149","https://openalex.org/W2027815133","https://openalex.org/W2037683905","https://openalex.org/W2051384716","https://openalex.org/W2061219859","https://openalex.org/W2067861590","https://openalex.org/W2073294836","https://openalex.org/W2076611807","https://openalex.org/W2078079053","https://openalex.org/W2083307702","https://openalex.org/W2090125639","https://openalex.org/W2094871797","https://openalex.org/W2101349050","https://openalex.org/W2105112969","https://openalex.org/W2108255910","https://openalex.org/W2151854612","https://openalex.org/W2151966615","https://openalex.org/W2155382325","https://openalex.org/W2156491735","https://openalex.org/W2158176328","https://openalex.org/W2160914149","https://openalex.org/W2167804035","https://openalex.org/W2170138789","https://openalex.org/W2170961388","https://openalex.org/W2211038077","https://openalex.org/W2280102746","https://openalex.org/W2285048913","https://openalex.org/W2305080235","https://openalex.org/W2350778671","https://openalex.org/W2397035252","https://openalex.org/W2465434652","https://openalex.org/W2538558227","https://openalex.org/W4299301436","https://openalex.org/W4300807510"],"related_works":["https://openalex.org/W2915067502","https://openalex.org/W4252560333","https://openalex.org/W3214026606","https://openalex.org/W4315815885","https://openalex.org/W2379631527","https://openalex.org/W2231057570","https://openalex.org/W4313218192","https://openalex.org/W2584907707","https://openalex.org/W2972476658","https://openalex.org/W222001389"],"abstract_inverted_index":{"Attackers":[0],"can":[1],"get":[2],"physical":[3],"control":[4],"of":[5,56,124,188,203],"a":[6,48,60,115,159,174,177],"computer":[7,61,179],"in":[8,62,114,171],"sleep":[9],"(S3/suspend-to-RAM),":[10],"if":[11],"it":[12],"is":[13,19,52,111,155],"lost,":[14],"stolen,":[15],"or":[16,41],"the":[17,96,122,125,144,201,208],"owner":[18],"being":[20],"coerced.":[21],"High-value":[22],"memory-resident":[23,76],"secrets,":[24],"including":[25],"disk":[26],"encryption":[27,89,109],"keys,":[28],"and":[29,93,191,215],"private":[30],"signature/encryption":[31],"keys":[32],"for":[33,197,213],"PGP,":[34],"may":[35,142],"be":[36,148],"extracted":[37],"(e.g.,":[38,134],"via":[39],"cold-boot":[40],"DMA":[42],"attacks),":[43],"by":[44,82,129],"physically":[45],"accessing":[46],"such":[47],"computer.":[49],"Our":[50],"goal":[51],"to":[53,73,147,157,163],"alleviate":[54],"threats":[55],"extracting":[57],"secrets":[58],"from":[59],"sleep,":[63,92],"without":[64,153,218],"relying":[65],"on":[66,176],"an":[67,85,102,193],"Internet-facing":[68],"service.":[69],"We":[70,166],"propose":[71],"Hypnoguard":[72,141,154,206],"protect":[74],"all":[75],"OS/user":[77],"data":[78],"across":[79],"S3":[80],"suspensions,":[81],"first":[83,209],"performing":[84],"in-place":[86],"full":[87,168],"memory":[88,108,145,169],"before":[90],"entering":[91],"then":[94],"restoring":[95],"plaintext":[97],"content":[98,146],"at":[99],"wakeup-time":[100,210],"through":[101],"environment-bound,":[103],"password-based":[104],"authentication":[105,214],"process.":[106],"The":[107],"key":[110,161,216],"effectively":[112],"\"sealed\"":[113],"Trusted":[116],"Platform":[117],"Module":[118],"(TPM)":[119],"chip":[120],"with":[121,183],"measurement":[123],"execution":[126,132],"environment":[127,212],"supported":[128],"CPU's":[130],"trusted":[131],"mode":[133],"Intel":[135],"TXT,":[136],"AMD-V/SVM).":[137],"Password":[138],"guessing":[139,152],"within":[140],"cause":[143],"permanently":[149],"inaccessible,":[150],"while":[151],"equivalent":[156],"brute-forcing":[158],"high-entropy":[160],"(due":[162],"TPM":[164],"protection).":[165],"achieved":[167],"encryption/decryption":[170],"less":[172],"than":[173],"second":[175],"mainstream":[178],"(Intel":[180],"i7-4771":[181],"CPU":[182],"8GB":[184],"RAM,":[185],"taking":[186],"advantage":[187],"multi-core":[189],"processing":[190],"AES-NI),":[192],"apparently":[194],"acceptable":[195],"delay":[196],"sleep-wake":[198],"transitions.":[199],"To":[200],"best":[202],"our":[204],"knowledge,":[205],"provides":[207],"secure":[211],"unlocking,":[217],"requiring":[219],"per-application":[220],"changes.":[221]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2016-09-16T00:00:00"}
