{"id":"https://openalex.org/W2789474937","doi":"https://doi.org/10.1145/3196494.3196518","title":"Leaky Wires","display_name":"Leaky Wires","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2789474937","doi":"https://doi.org/10.1145/3196494.3196518","mag":"2789474937"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1611.08882","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ilias Giechaskiel","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ilias Giechaskiel","raw_affiliation_strings":["University of Oxford, Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Oxford, Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kasper B. Rasmussen","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kasper B. Rasmussen","raw_affiliation_strings":["University of Oxford, Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Oxford, Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ken Eguro","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ken Eguro","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":11.3157,"has_fulltext":false,"cited_by_count":72,"citation_normalized_percentile":{"value":0.98942475,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtex","display_name":"Virtex","score":0.7178999781608582},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.6287000179290771},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6241000294685364},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5817999839782715},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.58160001039505},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5454999804496765},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4997999966144562},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4065999984741211},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.39660000801086426}],"concepts":[{"id":"https://openalex.org/C2777674469","wikidata":"https://www.wikidata.org/wiki/Q20741011","display_name":"Virtex","level":3,"score":0.7178999781608582},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.6287000179290771},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6241000294685364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5914999842643738},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5817999839782715},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.58160001039505},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5454999804496765},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.39660000801086426},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.38679999113082886},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.38679999113082886},{"id":"https://openalex.org/C90806461","wikidata":"https://www.wikidata.org/wiki/Q1144416","display_name":"Propagation delay","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.3330000042915344},{"id":"https://openalex.org/C197424946","wikidata":"https://www.wikidata.org/wiki/Q1165717","display_name":"Waveform","level":3,"score":0.32659998536109924},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C127879752","wikidata":"https://www.wikidata.org/wiki/Q3390760","display_name":"Place and route","level":3,"score":0.3125},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3034000098705292},{"id":"https://openalex.org/C142962650","wikidata":"https://www.wikidata.org/wiki/Q240838","display_name":"Reconfigurable computing","level":3,"score":0.28619998693466187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2822999954223633},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C114237110","wikidata":"https://www.wikidata.org/wiki/Q114901","display_name":"Gate array","level":3,"score":0.25940001010894775},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.2533000111579895}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3196494.3196518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1611.08882","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1611.08882","pdf_url":"https://arxiv.org/pdf/1611.08882","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1611.08882","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1611.08882","pdf_url":"https://arxiv.org/pdf/1611.08882","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1500140210","https://openalex.org/W1537450689","https://openalex.org/W1565273324","https://openalex.org/W1823893401","https://openalex.org/W1868304350","https://openalex.org/W1945000243","https://openalex.org/W1965439936","https://openalex.org/W1968261083","https://openalex.org/W1976532354","https://openalex.org/W2003452683","https://openalex.org/W2010699766","https://openalex.org/W2013560002","https://openalex.org/W2050145588","https://openalex.org/W2098222062","https://openalex.org/W2099132653","https://openalex.org/W2104255322","https://openalex.org/W2107937248","https://openalex.org/W2118565267","https://openalex.org/W2122670176","https://openalex.org/W2122941380","https://openalex.org/W2128105056","https://openalex.org/W2148330234","https://openalex.org/W2148700215","https://openalex.org/W2151758817","https://openalex.org/W2161998562","https://openalex.org/W2171744911","https://openalex.org/W2285315824","https://openalex.org/W2431678247","https://openalex.org/W2440736179","https://openalex.org/W2536183451"],"related_works":[],"abstract_inverted_index":{"Field-Programmable":[0],"Gate":[1],"Arrays":[2],"(FPGAs)":[3],"are":[4,12,170,196,233],"integrated":[5,20],"circuits":[6,21,232],"that":[7,62,85,124,144,156,195,224,258],"implement":[8],"reconfigurable":[9],"hardware.":[10],"They":[11],"used":[13,127],"in":[14,105,220],"modern":[15],"systems,":[16],"creating":[17],"specialized,":[18],"highly-optimized":[19],"without":[22,189],"the":[23,32,95,106,140,145,175,186,218,269],"need":[24],"to":[25,43,172,267],"design":[26],"and":[27,48,119,134,152,155,192,222,235,242,251,264],"manufacture":[28],"dedicated":[29],"chips.":[30],"As":[31],"capacity":[33],"of":[34,46,53,59,98,137,178,185,244,271],"FPGAs":[35,60],"grows,":[36],"it":[37,157,225],"is":[38,147,211,226],"increasingly":[39],"common":[40,73],"for":[41,128,135,149,193,198],"designers":[42,266],"incorporate":[44],"implementations":[45],"algorithms":[47],"protocols":[49],"from":[50,139],"a":[51,86,91,121,204],"range":[52],"third-party":[54],"sources.":[55],"The":[56],"monolithic":[57],"nature":[58],"means":[61],"all":[63],"on-chip":[64,74],"circuits,":[65,133],"including":[66],"third":[67],"party":[68],"black-box":[69],"designs,":[70],"must":[71],"share":[72],"infrastructure,":[75],"such":[76],"as":[77,199,201,212,214],"routing":[78,88],"resources.":[79],"In":[80,166],"this":[81,117,272],"paper,":[82],"we":[83,169,255],"observe":[84],"\"long\"":[87],"wire":[89,182],"carrying":[90],"logical":[92,176],"1":[93],"reduces":[94],"propagation":[96],"delay":[97],"other":[99],"adjacent":[100,180],"but":[101],"unconnected":[102],"long":[103,181],"wires":[104],"FPGA":[107],"interconnect,":[108],"thereby":[109],"leaking":[110],"information":[111,273],"about":[112],"its":[113],"state.":[114],"We":[115,142,216],"exploit":[116],"effect":[118,146],"propose":[120,256],"communication":[122],"channel":[123,209,219],"can":[125,158,236,259],"be":[126,159,237,260],"both":[129,150],"covert":[130],"transmissions":[131],"between":[132],"exfiltration":[136],"secrets":[138],"chip.":[141],"show":[143,223],"measurable":[148,227],"static":[151],"dynamic":[153],"signals,":[154],"detected":[160],"using":[161],"very":[162],"small":[163],"on-board":[164],"circuits.":[165],"our":[167,208],"prototype,":[168],"able":[171],"correctly":[173],"infer":[174],"state":[177],"an":[179],"over":[183],"99%":[184],"time,":[187],"even":[188,228],"error":[190],"correction,":[191],"signals":[194],"maintained":[197],"little":[200],"82us.":[202],"Using":[203],"Manchester":[205],"encoding":[206],"scheme,":[207],"bandwidth":[210],"high":[213],"6kbps.":[215],"characterize":[217],"detail":[221],"when":[229],"multiple":[230],"competing":[231],"present":[234],"replicated":[238],"on":[239],"different":[240],"generations":[241],"families":[243],"Xilinx":[245],"devices":[246],"(Virtex":[247],"5,":[248],"Virtex":[249],"6,":[250],"Artix":[252],"7).":[253],"Finally,":[254],"countermeasures":[257],"deployed":[261],"by":[262],"systems":[263],"tools":[265],"reduce":[268],"impact":[270],"leakage.":[274]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2018-03-29T00:00:00"}
