{"id":"https://openalex.org/W3128977233","doi":"https://doi.org/10.1145/3443707","title":"Cryptographic Software IP Protection without Compromising Performance or Timing Side-channel Leakage","display_name":"Cryptographic Software IP Protection without Compromising Performance or Timing Side-channel Leakage","publication_year":2021,"publication_date":"2021-02-09","ids":{"openalex":"https://openalex.org/W3128977233","doi":"https://doi.org/10.1145/3443707","mag":"3128977233"},"language":"en","primary_location":{"id":"doi:10.1145/3443707","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3443707","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3443707","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3443707","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006115873","display_name":"Arnab Kumar Biswas","orcid":"https://orcid.org/0000-0002-3057-2478"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Arnab Kumar Biswas","raw_affiliation_strings":["Electrical and Computer Engineering department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5006115873"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.4571,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58526031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"18","issue":"2","first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8758305907249451},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8194959163665771},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8188579082489014},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7002009749412537},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.5944873690605164},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5898651480674744},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5414670705795288},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5245544910430908},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4879855513572693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26104992628097534},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18362945318222046}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8758305907249451},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8194959163665771},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8188579082489014},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7002009749412537},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.5944873690605164},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5898651480674744},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5414670705795288},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5245544910430908},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4879855513572693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26104992628097534},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18362945318222046},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3443707","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3443707","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3443707","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3443707","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3443707","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3443707","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3128977233.pdf","grobid_xml":"https://content.openalex.org/works/W3128977233.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1138977110","https://openalex.org/W1490557050","https://openalex.org/W1514023947","https://openalex.org/W1567046609","https://openalex.org/W2008164459","https://openalex.org/W2029236670","https://openalex.org/W2081506936","https://openalex.org/W2084641398","https://openalex.org/W2099666487","https://openalex.org/W2108551812","https://openalex.org/W2128859735","https://openalex.org/W2131905000","https://openalex.org/W2148986322","https://openalex.org/W2154909745","https://openalex.org/W2165654401","https://openalex.org/W2294648786","https://openalex.org/W2314464932","https://openalex.org/W2559022203","https://openalex.org/W2595350342","https://openalex.org/W2618879712","https://openalex.org/W2751343396","https://openalex.org/W4232836212","https://openalex.org/W4247464060","https://openalex.org/W4251332849","https://openalex.org/W4395114117"],"related_works":["https://openalex.org/W2794898833","https://openalex.org/W2138040966","https://openalex.org/W2588029177","https://openalex.org/W2076588311","https://openalex.org/W3192308411","https://openalex.org/W2548004008","https://openalex.org/W3195179447","https://openalex.org/W3128977233","https://openalex.org/W2255916430","https://openalex.org/W4304141708"],"abstract_inverted_index":{"Program":[0],"obfuscation":[1,31,100],"is":[2],"a":[3,52,139],"widely":[4],"used":[5],"cryptographic":[6,66,164],"software":[7],"intellectual":[8],"property":[9],"(IP)":[10],"protection":[11],"technique":[12],"against":[13],"reverse":[14,38],"engineering":[15],"attacks":[16],"in":[17],"embedded":[18],"systems.":[19],"However,":[20],"very":[21,72],"few":[22],"works":[23],"have":[24],"studied":[25],"the":[26,34,97],"impact":[27],"of":[28,37,44,64,99,146],"combining":[29],"various":[30],"techniques":[32],"on":[33,138],"obscurity":[35,61,125],"(difficulty":[36],"engineering)":[39],"and":[40,62,120,126,172],"performance":[41,63],"(execution":[42],"time)":[43],"obfuscated":[45,65,106],"programs.":[46],"In":[47,112],"this":[48],"article,":[49],"we":[50],"propose":[51],"Genetic":[53],"Algorithm":[54],"(GA)-based":[55],"framework":[56,148],"that":[57,103,158],"not":[58],"only":[59],"optimizes":[60],"programs,":[67],"but":[68],"it":[69],"also":[70,132],"ensures":[71],"low":[73],"timing":[74,127,174],"side-channel":[75,128,175],"leakage.":[76],"Our":[77],"proposed":[78,160],"T":[79],"iming":[80],"S":[81,85],"ide":[82],"C":[83],"hannel":[84],"ensitive":[86],"P":[87],"rogram":[88],"O":[89,91],"bfuscation":[90],"ptimization":[92],"F":[93],"ramework":[94],"(TSC-SPOOF)":[95],"determines":[96],"combination":[98],"transformation":[101],"functions":[102],"produce":[104],"optimized":[105],"programs":[107,165],"with":[108,166],"preferred":[109],"optimization":[110],"parameters.":[111],"particular,":[113],"TSC-SPOOF":[114],"employs":[115],"normalized":[116],"compression":[117],"distance":[118],"(NCD)":[119],"channel":[121],"capacity":[122],"to":[123,149,163],"measure":[124],"leakage,":[129],"respectively.":[130],"We":[131],"use":[133],"RISC-V":[134],"rocket":[135],"core":[136],"running":[137],"Xilinx":[140],"Zynq":[141],"FPGA":[142],"device":[143],"as":[144],"part":[145],"our":[147,159],"obtain":[150],"realistic":[151],"results.":[152],"The":[153],"experimental":[154],"results":[155],"clearly":[156],"show":[157],"solution":[161],"leads":[162],"lower":[167,173],"execution":[168],"time,":[169],"higher":[170],"obscurity,":[171],"leakage":[176],"than":[177],"unguided":[178],"obfuscation.":[179]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
