{"id":"https://openalex.org/W4293261604","doi":"https://doi.org/10.1145/3489517.3530494","title":"DARPT","display_name":"DARPT","publication_year":2022,"publication_date":"2022-07-10","ids":{"openalex":"https://openalex.org/W4293261604","doi":"https://doi.org/10.1145/3489517.3530494"},"language":"en","primary_location":{"id":"doi:10.1145/3489517.3530494","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3489517.3530494","pdf_url":null,"source":{"id":"https://openalex.org/S4363608816","display_name":"Proceedings of the 59th ACM/IEEE Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 59th ACM/IEEE Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies"],"affiliations":[{"raw_affiliation_string":"Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443935","display_name":"Zhiyong Wang","orcid":"https://orcid.org/0000-0002-8043-0312"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Wang","raw_affiliation_strings":["Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies"],"affiliations":[{"raw_affiliation_string":"Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042166963","display_name":"Haoting Shen","orcid":"https://orcid.org/0000-0002-0244-9157"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoting Shen","raw_affiliation_strings":["Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies"],"affiliations":[{"raw_affiliation_string":"Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042490998","display_name":"Bolin Yang","orcid":"https://orcid.org/0000-0001-5423-4978"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bolin Yang","raw_affiliation_strings":["Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies"],"affiliations":[{"raw_affiliation_string":"Zhejiang University and Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000763204","display_name":"Qianmei Wu","orcid":"https://orcid.org/0009-0007-2596-2221"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianmei Wu","raw_affiliation_strings":["Zhejiang University"],"affiliations":[{"raw_affiliation_string":"Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Zhejiang University"],"affiliations":[{"raw_affiliation_string":"Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100403380"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.7271,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.71170006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"559","last_page":"564"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.712790846824646},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.701727032661438},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6832611560821533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6205254793167114},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.573383092880249},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5288986563682556},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4265483319759369},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.35836535692214966},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34247082471847534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3239249587059021},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2135944366455078},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1565113663673401}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.712790846824646},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.701727032661438},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6832611560821533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6205254793167114},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.573383092880249},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5288986563682556},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4265483319759369},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.35836535692214966},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34247082471847534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3239249587059021},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2135944366455078},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1565113663673401}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3489517.3530494","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3489517.3530494","pdf_url":null,"source":{"id":"https://openalex.org/S4363608816","display_name":"Proceedings of the 59th ACM/IEEE Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 59th ACM/IEEE Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W1589364525","https://openalex.org/W2522903812","https://openalex.org/W2760794929","https://openalex.org/W2761003783","https://openalex.org/W2794898833","https://openalex.org/W2887256018","https://openalex.org/W2899083777","https://openalex.org/W2950019944","https://openalex.org/W2966980899","https://openalex.org/W2973060714","https://openalex.org/W2987827054","https://openalex.org/W2996863257","https://openalex.org/W3011348040","https://openalex.org/W3036146501","https://openalex.org/W3110986688","https://openalex.org/W3111614974","https://openalex.org/W3183466684","https://openalex.org/W3185063964","https://openalex.org/W3213911739","https://openalex.org/W4242164861"],"related_works":["https://openalex.org/W4214838992","https://openalex.org/W2403338641","https://openalex.org/W2794898833","https://openalex.org/W2769734684","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2022533428","https://openalex.org/W1796231437","https://openalex.org/W2903787673","https://openalex.org/W2969678054"],"abstract_inverted_index":{"With":[0],"rapidly":[1],"increasing":[2],"demands":[3],"for":[4,172,194],"cloud":[5,16,75],"computing,":[6],"Field":[7],"Programmable":[8],"Gate":[9],"Array":[10],"(FPGA)":[11],"has":[12],"become":[13],"popular":[14],"in":[15,73],"datacenters.":[17],"Although":[18],"it":[19],"improves":[20],"computing":[21],"performance":[22],"through":[23,140],"flexible":[24],"hardware":[25],"acceleration,":[26],"new":[27],"security":[28],"concerns":[29],"also":[30,66],"come":[31],"along.":[32],"For":[33],"example,":[34],"unavoidable":[35],"physical":[36],"leakage":[37,139],"from":[38,125],"the":[39,141,154,157,165,195,202],"Power":[40,58],"Distribution":[41],"Network":[42],"(PDN)":[43],"can":[44,65],"be":[45,67],"utilized":[46],"by":[47,70,151,199],"attackers":[48],"to":[49,82,90,121,135,164,186,222],"mount":[50],"remote":[51,93],"Side-Channel":[52],"Attacks":[53,59,63],"(SCA),":[54],"such":[55],"as":[56],"Correlation":[57],"(CPA).":[60],"Remote":[61,115],"Fault":[62],"(FA)":[64],"successfully":[68],"presented":[69],"malicious":[71],"tenants":[72],"a":[74,79,107,173],"multi-tenant":[76],"scenario,":[77],"posing":[78],"significant":[80,207],"threat":[81],"legal":[83],"tenants.":[84],"There":[85],"are":[86,170,191],"few":[87],"hardware-based":[88],"countermeasures":[89],"defeat":[91],"both":[92],"attacks":[94],"that":[95,167,184],"aforementioned.":[96],"In":[97,162],"this":[98],"work,":[99],"we":[100],"exploit":[101],"Time-to-Digital":[102],"Converter":[103],"(TDC)":[104],"and":[105,127,144],"propose":[106],"novel":[108],"defense":[109],"technique":[110],"called":[111],"DARPT":[112,130],"(Defense":[113],"Against":[114],"Physical":[116],"attack":[117],"based":[118],"on":[119,176],"TDC)":[120],"protect":[122],"sensitive":[123],"information":[124,138],"CPA":[126,175],"FA.":[128,224],"Specifically,":[129],"produces":[131],"random":[132],"clock":[133],"jitters":[134],"reduce":[136],"possible":[137],"power":[142],"side-channel":[143],"provides":[145],"an":[146],"early":[147],"warning":[148],"of":[149,156],"FA":[150,215],"constantly":[152],"monitoring":[153],"variation":[155],"voltage":[158,204],"drop":[159],"across":[160],"PDN.":[161],"comparison":[163],"fact":[166],"8k":[168],"traces":[169,188],"enough":[171,193],"successful":[174],"FPGA":[177,197],"without":[178],"DARPT,":[179],"our":[180],"experimental":[181],"results":[182],"show":[183],"up":[185],"800k":[187],"(100":[189],"times)":[190],"not":[192],"same":[196],"protected":[198],"DARPT.":[200],"Meanwhile,":[201],"TDC-based":[203],"monitor":[205],"presents":[206],"readout":[208],"changes":[209],"(by":[210],"51.82%":[211],"or":[212],"larger)":[213],"under":[214],"with":[216],"ring":[217],"oscillators,":[218],"demonstrating":[219],"sufficient":[220],"sensitivities":[221],"voltage-drop-based":[223]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-08-27T00:00:00"}
