{"id":"https://openalex.org/W4386965243","doi":"https://doi.org/10.1145/3569562.3569566","title":"Clueless: A Tool Characterising Values Leaking as Addresses","display_name":"Clueless: A Tool Characterising Values Leaking as Addresses","publication_year":2022,"publication_date":"2022-10-01","ids":{"openalex":"https://openalex.org/W4386965243","doi":"https://doi.org/10.1145/3569562.3569566"},"language":"en","primary_location":{"id":"doi:10.1145/3569562.3569566","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3569562.3569566","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3569562.3569566","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3569562.3569566","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081879456","display_name":"Xiaoyue Chen","orcid":"https://orcid.org/0000-0002-0727-3023"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Xiaoyue Chen","raw_affiliation_strings":["Department of Information Technology, Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083504945","display_name":"Pavlos Aimoniotis","orcid":"https://orcid.org/0000-0001-6602-1988"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Pavlos Aimoniotis","raw_affiliation_strings":["Department of Information Technology, Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020214726","display_name":"Stefanos Kaxiras","orcid":"https://orcid.org/0000-0001-8267-0232"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefanos Kaxiras","raw_affiliation_strings":["Department of Information Technology, Uppsala University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Uppsala University, Sweden","institution_ids":["https://openalex.org/I123387679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081879456"],"corresponding_institution_ids":["https://openalex.org/I123387679"],"apc_list":null,"apc_paid":null,"fwci":0.1378,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58639858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7532556056976318},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.566750705242157},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.5264873504638672},{"id":"https://openalex.org/keywords/instrumentation","display_name":"Instrumentation (computer programming)","score":0.5255733132362366},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.437602162361145},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42009466886520386},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3904520273208618},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.27983558177948},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21562418341636658},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1202559769153595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11513549089431763},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.08228689432144165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7532556056976318},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.566750705242157},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.5264873504638672},{"id":"https://openalex.org/C118530786","wikidata":"https://www.wikidata.org/wiki/Q1134732","display_name":"Instrumentation (computer programming)","level":2,"score":0.5255733132362366},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.437602162361145},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42009466886520386},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3904520273208618},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.27983558177948},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21562418341636658},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1202559769153595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11513549089431763},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.08228689432144165},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3569562.3569566","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3569562.3569566","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3569562.3569566","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:uu-523359","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-523359","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":{"id":"doi:10.1145/3569562.3569566","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3569562.3569566","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3569562.3569566","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4310120812","display_name":null,"funder_award_id":"2021-020","funder_id":"https://openalex.org/F4320308943","funder_display_name":"Microsoft Research"},{"id":"https://openalex.org/G5638537008","display_name":null,"funder_award_id":"VINNOVA","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G712881263","display_name":null,"funder_award_id":"2018-","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G7435060098","display_name":null,"funder_award_id":"2018-05254","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G8576755144","display_name":null,"funder_award_id":"021-02422","funder_id":"https://openalex.org/F4320321030","funder_display_name":"VINNOVA"}],"funders":[{"id":"https://openalex.org/F4320308943","display_name":"Microsoft Research","ror":"https://ror.org/00d0nc645"},{"id":"https://openalex.org/F4320321030","display_name":"VINNOVA","ror":"https://ror.org/01kd5m353"},{"id":"https://openalex.org/F4320322581","display_name":"Vetenskapsr\u00e5det","ror":"https://ror.org/03zttf063"},{"id":"https://openalex.org/F4320324119","display_name":"Uppsala Universitet","ror":"https://ror.org/048a87296"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386965243.pdf","grobid_xml":"https://content.openalex.org/works/W4386965243.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1480815770","https://openalex.org/W1934458198","https://openalex.org/W1996256636","https://openalex.org/W2089745089","https://openalex.org/W2101152030","https://openalex.org/W2129278597","https://openalex.org/W2131202839","https://openalex.org/W2144789413","https://openalex.org/W2161688581","https://openalex.org/W2172060328","https://openalex.org/W2884163605","https://openalex.org/W2903910116","https://openalex.org/W2952322674","https://openalex.org/W2963311060","https://openalex.org/W3159033757","https://openalex.org/W3199976353","https://openalex.org/W3210302253","https://openalex.org/W4232120412","https://openalex.org/W4238341678","https://openalex.org/W4252481514","https://openalex.org/W4288086178","https://openalex.org/W4289038676","https://openalex.org/W6753443810"],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W562823126","https://openalex.org/W2106037662","https://openalex.org/W1530419332","https://openalex.org/W2045782830","https://openalex.org/W2143942744","https://openalex.org/W2165392093","https://openalex.org/W2469134140","https://openalex.org/W1972557159","https://openalex.org/W2993874308"],"abstract_inverted_index":{"Clueless":[0,29],"is":[1],"a":[2],"binary":[3],"instrumentation":[4],"tool":[5],"that":[6,38],"characterises":[7],"explicit":[8],"cache":[9],"side":[10],"channel":[11],"vulnerabilities":[12],"of":[13,19],"programs.":[14],"It":[15],"detects":[16],"the":[17],"transformation":[18],"data":[20,31],"values":[21,32],"into":[22],"addresses":[23],"by":[24],"tracking":[25],"dynamic":[26],"instruction":[27],"dependencies.":[28],"tags":[30],"in":[33,42],"memory":[34],"if":[35],"it":[36],"discovers":[37],"they":[39],"are":[40],"used":[41],"address":[43],"calculations":[44],"to":[45],"further":[46],"access":[47],"other":[48],"data.":[49]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
