{"id":"https://openalex.org/W2885297972","doi":"https://doi.org/10.1145/3274694.3274741","title":"MicroWalk","display_name":"MicroWalk","publication_year":2018,"publication_date":"2018-12-03","ids":{"openalex":"https://openalex.org/W2885297972","doi":"https://doi.org/10.1145/3274694.3274741","mag":"2885297972"},"language":"en","primary_location":{"id":"doi:10.1145/3274694.3274741","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1808.05575","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081651621","display_name":"Jan Wichelmann","orcid":"https://orcid.org/0000-0002-5748-5462"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jan Wichelmann","raw_affiliation_strings":["Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072406383","display_name":"Daniel Moghimi","orcid":"https://orcid.org/0000-0002-3123-5916"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmad Moghimi","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["Universit\u00e4t zu L\u00fcbeck &amp; WPI, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t zu L\u00fcbeck &amp; WPI, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066592325","display_name":"Berk Sunar","orcid":"https://orcid.org/0000-0001-5404-5368"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Berk Sunar","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081651621"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":4.7387,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.95874964,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7961753606796265},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7312310338020325},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6174306273460388},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.593669056892395},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.527652382850647},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.5264395475387573},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.506025493144989},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4310365915298462},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.42196208238601685},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4105469584465027},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3959214985370636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25794264674186707},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.16615799069404602},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.14240917563438416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7961753606796265},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7312310338020325},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6174306273460388},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.593669056892395},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.527652382850647},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.5264395475387573},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.506025493144989},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4310365915298462},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.42196208238601685},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4105469584465027},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3959214985370636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25794264674186707},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.16615799069404602},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.14240917563438416},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3274694.3274741","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1808.05575","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.05575","pdf_url":"https://arxiv.org/pdf/1808.05575","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1808.05575","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.05575","pdf_url":"https://arxiv.org/pdf/1808.05575","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":95,"referenced_works":["https://openalex.org/W147129824","https://openalex.org/W151864858","https://openalex.org/W200116028","https://openalex.org/W348312514","https://openalex.org/W1480815770","https://openalex.org/W1488058190","https://openalex.org/W1488986397","https://openalex.org/W1503814339","https://openalex.org/W1527059802","https://openalex.org/W1555558540","https://openalex.org/W1560720671","https://openalex.org/W1613874182","https://openalex.org/W1659664084","https://openalex.org/W1664413462","https://openalex.org/W1671031071","https://openalex.org/W1740185811","https://openalex.org/W1752847028","https://openalex.org/W1809974132","https://openalex.org/W1862426464","https://openalex.org/W1934458198","https://openalex.org/W1963578159","https://openalex.org/W2001317479","https://openalex.org/W2013613544","https://openalex.org/W2020808628","https://openalex.org/W2030906223","https://openalex.org/W2041103425","https://openalex.org/W2056778557","https://openalex.org/W2062989416","https://openalex.org/W2071929572","https://openalex.org/W2097151854","https://openalex.org/W2107289862","https://openalex.org/W2116051280","https://openalex.org/W2131019288","https://openalex.org/W2132350687","https://openalex.org/W2134633067","https://openalex.org/W2150620897","https://openalex.org/W2150787412","https://openalex.org/W2153185479","https://openalex.org/W2159520802","https://openalex.org/W2163362445","https://openalex.org/W2170993700","https://openalex.org/W2183177643","https://openalex.org/W2208250432","https://openalex.org/W2255548496","https://openalex.org/W2293441536","https://openalex.org/W2294921903","https://openalex.org/W2460965380","https://openalex.org/W2463516579","https://openalex.org/W2469208367","https://openalex.org/W2491070407","https://openalex.org/W2496999134","https://openalex.org/W2503562633","https://openalex.org/W2504579840","https://openalex.org/W2507765405","https://openalex.org/W2515614845","https://openalex.org/W2538893033","https://openalex.org/W2544328905","https://openalex.org/W2562036180","https://openalex.org/W2564856904","https://openalex.org/W2586555532","https://openalex.org/W2594692021","https://openalex.org/W2597472572","https://openalex.org/W2604789199","https://openalex.org/W2612278735","https://openalex.org/W2616901112","https://openalex.org/W2625850712","https://openalex.org/W2726246108","https://openalex.org/W2735733036","https://openalex.org/W2738913803","https://openalex.org/W2744774028","https://openalex.org/W2745299473","https://openalex.org/W2751455878","https://openalex.org/W2751989915","https://openalex.org/W2752986023","https://openalex.org/W2753573171","https://openalex.org/W2766052299","https://openalex.org/W2770572532","https://openalex.org/W2781723315","https://openalex.org/W2789817163","https://openalex.org/W2792326895","https://openalex.org/W2799089179","https://openalex.org/W2807478047","https://openalex.org/W2860564492","https://openalex.org/W2889434695","https://openalex.org/W2910752585","https://openalex.org/W2949317607","https://openalex.org/W2951343197","https://openalex.org/W2964206587","https://openalex.org/W3101072679","https://openalex.org/W4225635692","https://openalex.org/W4239813889","https://openalex.org/W4251262790","https://openalex.org/W4251742697","https://openalex.org/W4252137572","https://openalex.org/W4254873464"],"related_works":["https://openalex.org/W189451467","https://openalex.org/W2580249689","https://openalex.org/W2969678054","https://openalex.org/W2769734684","https://openalex.org/W2022533428","https://openalex.org/W2103519941","https://openalex.org/W2903787673","https://openalex.org/W2777343049","https://openalex.org/W3158338108","https://openalex.org/W2584285084"],"abstract_inverted_index":{"Microarchitectural":[0],"side":[1,56],"channels":[2,57],"expose":[3],"unprotected":[4],"software":[5,12,35,90,138,217],"to":[6,16,123,151],"information":[7],"leakage":[8,167],"attacks":[9,45],"where":[10],"a":[11,21,72,111,137],"adversary":[13],"is":[14,58,95,103],"able":[15],"track":[17],"runtime":[18],"behavior":[19,94],"of":[20,43,49,78,89,96,145,155,169,187,195],"benign":[22],"process":[23],"and":[24,87,119,126,130,177],"steal":[25],"secrets":[26],"such":[27],"as":[28],"cryptographic":[29,50,173,184],"keys.":[30],"As":[31],"suggested":[32],"by":[33,66,161],"incremental":[34],"patches":[36],"for":[37,92,142],"the":[38,79,100,158],"RSA":[39],"algorithm":[40],"against":[41,55],"variants":[42],"side-channel":[44,143],"within":[46],"different":[47,183],"versions":[48],"libraries,":[51],"protecting":[52],"security-critical":[53],"algorithms":[54],"an":[59],"intricate":[60],"task.":[61],"Software":[62],"protections":[63],"avoid":[64],"leakages":[65,202,215],"operating":[67],"in":[68,191,203,216],"constant":[69],"time":[70],"with":[71],"uniform":[73],"resource":[74],"usage":[75],"pattern":[76],"independent":[77],"processed":[80],"secret.":[81],"In":[82,106],"this":[83,107],"respect,":[84],"automated":[85],"testing":[86],"verification":[88],"binaries":[91,146],"leakage-free":[93],"importance,":[97],"particularly":[98],"when":[99],"source":[101],"code":[102],"not":[104],"available.":[105],"work,":[108],"we":[109,164],"propose":[110],"novel":[112],"technique":[113],"based":[114,129,132],"on":[115],"Dynamic":[116],"Binary":[117],"Instrumentation":[118],"Mutual":[120],"Information":[121],"Analysis":[122],"efficiently":[124,212],"locate":[125],"quantify":[127],"memory":[128],"control-flow":[131],"microarchitectural":[133,214],"leakages.":[134],"We":[135,180],"develop":[136],"framework":[139],"named":[140],"MicroWalk":[141,210],"analysis":[144,168],"which":[147],"can":[148,211],"be":[149],"extended":[150],"support":[152],"new":[153],"classes":[154],"leakage.":[156],"For":[157],"first":[159],"time,":[160],"utilizing":[162],"MicroWalk,":[163],"perform":[165],"rigorous":[166],"two":[170],"widely-used":[171],"closed-source":[172],"libraries:":[174],"Intel":[175],"IPP":[176],"Microsoft":[178],"CNG.":[179],"analyze":[181],"15":[182],"implementations":[185],"consisting":[186],"112":[188],"million":[189],"instructions":[190],"about":[192],"105":[193],"minutes":[194],"CPU":[196],"time.":[197],"By":[198],"locating":[199],"previously":[200],"unknown":[201],"hardened":[204],"implementations,":[205],"our":[206],"results":[207],"suggest":[208],"that":[209],"find":[213],"binaries.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":10}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2018-08-22T00:00:00"}
