{"id":"https://openalex.org/W3083668898","doi":"https://doi.org/10.1145/3386263.3407586","title":"Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks","display_name":"Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks","publication_year":2020,"publication_date":"2020-09-04","ids":{"openalex":"https://openalex.org/W3083668898","doi":"https://doi.org/10.1145/3386263.3407586","mag":"3083668898"},"language":"en","primary_location":{"id":"doi:10.1145/3386263.3407586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3386263.3407586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3386263.3407586","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3386263.3407586","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100452654","display_name":"Han Wang","orcid":"https://orcid.org/0000-0001-7347-3763"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Han Wang","raw_affiliation_strings":["University of California, Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080844858","display_name":"Hossein Sayadi","orcid":"https://orcid.org/0000-0001-6423-0145"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossein Sayadi","raw_affiliation_strings":["California State University, Long Beach, Long Beach, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Long Beach, Long Beach, CA, USA","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060036961","display_name":"Avesta Sasan","orcid":"https://orcid.org/0000-0002-4052-8075"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avesta Sasan","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103033046","display_name":"Setareh Rafatirad","orcid":"https://orcid.org/0000-0003-2035-8512"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Setareh Rafatirad","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084010501","display_name":"Tinoosh Mohsenin","orcid":"https://orcid.org/0000-0001-5551-2124"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tinoosh Mohsenin","raw_affiliation_strings":["University of Maryland, Baltimore County, Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, Baltimore County, Baltimore, MD, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047382437","display_name":"Houman Homayoun","orcid":"https://orcid.org/0000-0001-8904-4699"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houman Homayoun","raw_affiliation_strings":["University of California, Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100452654"],"corresponding_institution_ids":["https://openalex.org/I84218800"],"apc_list":null,"apc_paid":null,"fwci":2.121,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89844596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"181","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8026624917984009},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6650888323783875},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.633330762386322},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.5962072610855103},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.5675513744354248},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5509332418441772},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4672733545303345},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.45633333921432495},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4497216045856476},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4019663333892822},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3651694655418396},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35298657417297363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16497918963432312},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1632387340068817},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.12516766786575317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8026624917984009},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6650888323783875},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.633330762386322},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.5962072610855103},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.5675513744354248},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5509332418441772},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4672733545303345},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.45633333921432495},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4497216045856476},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4019663333892822},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3651694655418396},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35298657417297363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16497918963432312},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1632387340068817},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.12516766786575317},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3386263.3407586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3386263.3407586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3386263.3407586","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3386263.3407586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3386263.3407586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3386263.3407586","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3083668898.pdf","grobid_xml":"https://content.openalex.org/works/W3083668898.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1606281225","https://openalex.org/W1934458198","https://openalex.org/W2337480911","https://openalex.org/W2507765405","https://openalex.org/W2522718524","https://openalex.org/W2527810902","https://openalex.org/W2750713733","https://openalex.org/W2768424695","https://openalex.org/W2792326895","https://openalex.org/W2809457377","https://openalex.org/W2899912069","https://openalex.org/W2917061593","https://openalex.org/W2932551155","https://openalex.org/W2945027786","https://openalex.org/W2963311060","https://openalex.org/W2965085876","https://openalex.org/W3004000725","https://openalex.org/W3036243698","https://openalex.org/W3045670632","https://openalex.org/W4254920161","https://openalex.org/W4256383029","https://openalex.org/W4256398664","https://openalex.org/W4298112463","https://openalex.org/W4299301436","https://openalex.org/W6600238479","https://openalex.org/W6600280466","https://openalex.org/W6600340491"],"related_works":["https://openalex.org/W1916582918","https://openalex.org/W4235677263","https://openalex.org/W2381374827","https://openalex.org/W2109440006","https://openalex.org/W2745771918","https://openalex.org/W1971956962","https://openalex.org/W1558760591","https://openalex.org/W3028997697","https://openalex.org/W2583594538","https://openalex.org/W2131019288"],"abstract_inverted_index":{"Microarchitectural":[0],"Side-Channel":[1],"Attacks":[2],"(SCAs)":[3],"have":[4,41,87],"posed":[5],"serious":[6],"threats":[7],"to":[8,150,172,215],"the":[9,65,78,84,89,132,139,160,175,183,209,217],"security":[10],"of":[11,34,91,95,114,154,185,190],"modern":[12],"computing":[13],"systems.":[14],"Such":[15],"attacks":[16],"exploit":[17],"side-channel":[18,121],"vulnerabilities":[19],"stemming":[20],"from":[21,54],"fundamental":[22],"performance-enhancing":[23],"components":[24],"such":[25,63],"as":[26],"cache":[27],"memories.":[28],"The":[29],"existing":[30],"works":[31],"on":[32,37,125],"detection":[33,80,123,203,226],"SCAs":[35,79,180,225],"based":[36,124],"low-level":[38,126],"microarchitectural":[39,102,127,165,224],"features":[40,141,166],"considered":[42],"collecting":[43],"both":[44],"victim":[45,133],"and":[46,142,147,195,212],"attack":[47,66,122,146,148],"applications'":[48,134],"hardware":[49,56],"events":[50],"that":[51],"are":[52,167,193],"captured":[53],"processors'":[55],"performance":[57],"counter":[58],"(HPC)":[59],"registers.":[60],"However,":[61],"in":[62,76,100,106],"techniques":[64],"HPCs":[67,161],"data":[68],"can":[69],"be":[70],"easily":[71],"manipulated":[72],"and/or":[73],"corrupted":[74],"resulting":[75],"misleading":[77],"mechanism.":[81],"In":[82,104],"addition,":[83],"prior":[85],"studies":[86],"explored":[88],"suitability":[90],"a":[92,111],"limited":[93],"number":[94],"Machine":[96],"Learning":[97],"(ML)":[98],"algorithms":[99],"detecting":[101],"SCAs.":[103],"response,":[105],"this":[107,130],"paper,":[108],"we":[109],"conduct":[110],"comprehensive":[112],"evaluation":[113,200],"various":[115,188],"machine":[116],"learning-based":[117],"countermeasures":[118],"for":[119,179,222],"real-time":[120,223],"features.":[128],"For":[129,182],"purpose,":[131],"behavior":[135],"is":[136],"collected":[137],"using":[138],"HPC":[140],"analyzed":[143],"under":[144],"no":[145],"conditions":[149],"avoid":[151],"potential":[152],"manipulation":[153],"attackers'":[155],"HPCs.":[156],"We":[157],"further":[158],"explore":[159],"monitoring":[162],"overhead":[163],"when":[164],"sampled":[168],"at":[169],"different":[170,199],"intervals":[171],"find":[173],"out":[174],"appropriate":[176],"sampling":[177],"interval":[178],"detection.":[181],"purpose":[184],"thorough":[186],"analysis,":[187],"types":[189],"ML":[191,220],"classifiers":[192,221],"implemented":[194],"precisely":[196],"compared":[197],"across":[198],"metrics":[201],"including":[202],"accuracy,":[204],"F-measure,":[205],"robustness":[206],"(Area":[207],"Under":[208],"ROC":[210],"Curve),":[211],"computational":[213],"latency":[214],"identify":[216],"most":[218],"efficient":[219]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
