{"id":"https://openalex.org/W2588081654","doi":"https://doi.org/10.1145/3031836.3031842","title":"Filtering-based CPA","display_name":"Filtering-based CPA","publication_year":2017,"publication_date":"2017-01-24","ids":{"openalex":"https://openalex.org/W2588081654","doi":"https://doi.org/10.1145/3031836.3031842","mag":"2588081654"},"language":"en","primary_location":{"id":"doi:10.1145/3031836.3031842","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3031836.3031842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal-emse.ccsd.cnrs.fr/emse-01490735/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026539532","display_name":"Karim M. Abdellatif","orcid":"https://orcid.org/0000-0003-1279-1869"},"institutions":[{"id":"https://openalex.org/I3019848993","display_name":"Mines Saint-\u00c9tienne","ror":"https://ror.org/05a1dws80","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993"]},{"id":"https://openalex.org/I89466785","display_name":"Minia University","ror":"https://ror.org/02hcv4z63","country_code":"EG","type":"education","lineage":["https://openalex.org/I89466785"]}],"countries":["EG","FR"],"is_corresponding":true,"raw_author_name":"Karim M. Abdellatif","raw_affiliation_strings":["\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France and Minia University, Egypt"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France and Minia University, Egypt","institution_ids":["https://openalex.org/I3019848993","https://openalex.org/I89466785"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008551348","display_name":"Damien Courouss\u00e9","orcid":"https://orcid.org/0000-0003-2761-3627"},"institutions":[{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]},{"id":"https://openalex.org/I3020098449","display_name":"CEA Grenoble","ror":"https://ror.org/02mg6n827","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I3020098449"]},{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Damien Courouss\u00e9","raw_affiliation_strings":["Univ. Grenoble Alpes, Grenoble, France and CEA, LIST, MINATEC Campus, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"Univ. Grenoble Alpes, Grenoble, France and CEA, LIST, MINATEC Campus, Grenoble, France","institution_ids":["https://openalex.org/I4210085861","https://openalex.org/I899635006","https://openalex.org/I106785703","https://openalex.org/I3020098449","https://openalex.org/I2738703131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033383288","display_name":"Olivier Potin","orcid":"https://orcid.org/0000-0001-9110-2800"},"institutions":[{"id":"https://openalex.org/I3019848993","display_name":"Mines Saint-\u00c9tienne","ror":"https://ror.org/05a1dws80","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Potin","raw_affiliation_strings":["\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France","institution_ids":["https://openalex.org/I3019848993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029250096","display_name":"Philippe Jaillon","orcid":null},"institutions":[{"id":"https://openalex.org/I3019848993","display_name":"Mines Saint-\u00c9tienne","ror":"https://ror.org/05a1dws80","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Philippe Jaillon","raw_affiliation_strings":["\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Suprieure des Mines de Saint-Etienne, France","institution_ids":["https://openalex.org/I3019848993"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026539532"],"corresponding_institution_ids":["https://openalex.org/I3019848993","https://openalex.org/I89466785"],"apc_list":null,"apc_paid":null,"fwci":0.6236,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.75932797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"29","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7994118928909302},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7993252873420715},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.705966591835022},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.7042832970619202},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6425564289093018},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5770148038864136},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4728042483329773},{"id":"https://openalex.org/keywords/software-implementation","display_name":"Software implementation","score":0.468539834022522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45515793561935425},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4523051083087921},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4379638731479645},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2594483494758606},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.16103115677833557},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09014257788658142},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08594387769699097},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07678627967834473}],"concepts":[{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7994118928909302},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7993252873420715},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.705966591835022},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.7042832970619202},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6425564289093018},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5770148038864136},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4728042483329773},{"id":"https://openalex.org/C2983609787","wikidata":"https://www.wikidata.org/wiki/Q10534782","display_name":"Software implementation","level":3,"score":0.468539834022522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45515793561935425},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4523051083087921},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4379638731479645},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2594483494758606},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.16103115677833557},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09014257788658142},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08594387769699097},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07678627967834473},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3031836.3031842","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3031836.3031842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:emse-01490735v1","is_oa":true,"landing_page_url":"https://hal-emse.ccsd.cnrs.fr/emse-01490735","pdf_url":"https://hal-emse.ccsd.cnrs.fr/emse-01490735/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, &#x27E8;10.1145/3031836.3031842&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:emse-01490735v1","is_oa":true,"landing_page_url":"https://hal-emse.ccsd.cnrs.fr/emse-01490735","pdf_url":"https://hal-emse.ccsd.cnrs.fr/emse-01490735/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, &#x27E8;10.1145/3031836.3031842&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4110391279","display_name":null,"funder_award_id":"project,","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G494958819","display_name":"Runtime Code Generation to Secure Devices","funder_award_id":"ANR-13-INSE-0006","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2588081654.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1548028743","https://openalex.org/W1572251059","https://openalex.org/W1599906532","https://openalex.org/W2116207513","https://openalex.org/W2125025555","https://openalex.org/W2355550369","https://openalex.org/W2519252889","https://openalex.org/W2951615568","https://openalex.org/W3029054646","https://openalex.org/W6820972643"],"related_works":["https://openalex.org/W2121017442","https://openalex.org/W1790664656","https://openalex.org/W2900215011","https://openalex.org/W2354319712","https://openalex.org/W2157150548","https://openalex.org/W2741776607","https://openalex.org/W1492604955","https://openalex.org/W62555423","https://openalex.org/W150283939","https://openalex.org/W2474827264"],"abstract_inverted_index":{"Secure":[0],"implementations":[1],"against":[2],"side":[3,65],"channel":[4,66],"attacks":[5],"usually":[6],"combine":[7],"hiding":[8,28],"and":[9],"masking":[10],"protections":[11],"in":[12,44,98],"software":[13],"implementations.":[14],"In":[15],"this":[16,50,69],"work,":[17],"we":[18,52,75],"focus":[19],"on":[20],"desynchronization":[21,33,79],"protection":[22],"which":[23],"is":[24,34],"considered":[25],"as":[26,71],"a":[27,37,63,72,94],"countermeasure.":[29],"The":[30],"idea":[31],"of":[32,40,46,81,100],"to":[35,57],"obtain":[36],"non-predictable":[38],"offset":[39],"the":[41,78,82],"attacking":[42],"point":[43],"terms":[45],"time":[47],"dimension.":[48],"For":[49],"purpose,":[51],"present":[53],"exploiting":[54],"pattern-recognition":[55],"methods":[56],"filter":[58],"interesting":[59],"points":[60],"for":[61,93],"obtaining":[62],"successful":[64,95],"attack.":[67],"Using":[68],"tool":[70],"case":[73,99],"study,":[74],"completely":[76],"cancel":[77],"effect":[80],"CHES":[83],"2009/2010":[84],"countermeasure":[85,102],"[2,":[86],"3].":[87],"Moreover,":[88],"25k":[89],"traces":[90],"are":[91],"needed":[92],"key":[96],"recoveries":[97],"polymorphism-based":[101],"[4].":[103]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2017-02-24T00:00:00"}
