{"id":"https://openalex.org/W4389491888","doi":"https://doi.org/10.1145/3613424.3623796","title":"Hardware Support for Constant-Time Programming","display_name":"Hardware Support for Constant-Time Programming","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389491888","doi":"https://doi.org/10.1145/3613424.3623796"},"language":"en","primary_location":{"id":"doi:10.1145/3613424.3623796","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623796","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623796","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623796","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107808101","display_name":"Y.H. Miao","orcid":"https://orcid.org/0009-0004-0284-3949"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yuanqing Miao","raw_affiliation_strings":["The Pennsylvania State University, United States of America"],"raw_orcid":"https://orcid.org/0009-0004-0284-3949","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, United States of America","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007116603","display_name":"Mahmut Kandemir","orcid":"https://orcid.org/0000-0002-9940-9951"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmut Taylan Kandemir","raw_affiliation_strings":["The Pennsylvania State University, United States of America"],"raw_orcid":"https://orcid.org/0000-0002-9940-9951","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, United States of America","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100722775","display_name":"Danfeng Zhang","orcid":"https://orcid.org/0000-0003-1942-6872"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]},{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danfeng Zhang","raw_affiliation_strings":["The Pennsylvania State University, United States of America and Duke University, USA"],"raw_orcid":"https://orcid.org/0000-0003-1942-6872","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, United States of America and Duke University, USA","institution_ids":["https://openalex.org/I130769515","https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034511665","display_name":"Yingtian Zhang","orcid":"https://orcid.org/0009-0007-7220-8571"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingtian Zhang","raw_affiliation_strings":["The Pennsylvania State University, USA"],"raw_orcid":"https://orcid.org/0009-0007-7220-8571","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010830558","display_name":"Gang Tan","orcid":"https://orcid.org/0000-0001-6109-6091"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Tan","raw_affiliation_strings":["The Pennsylvania State University, United States of America"],"raw_orcid":"https://orcid.org/0000-0001-6109-6091","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, United States of America","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["The Pennsylvania State University, United States of America"],"raw_orcid":"https://orcid.org/0000-0002-0741-5511","affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, United States of America","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5107808101"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.5112,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72773585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"856","last_page":"870"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8002951145172119},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7796971797943115},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6369491815567017},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5991700291633606},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.5962405204772949},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5757245421409607},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5442923903465271},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5109402537345886},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.49047157168388367},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24761876463890076},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23076379299163818},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19066733121871948},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15660229325294495},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10338816046714783},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09392052888870239}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8002951145172119},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7796971797943115},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6369491815567017},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5991700291633606},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.5962405204772949},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5757245421409607},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5442923903465271},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5109402537345886},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.49047157168388367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24761876463890076},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23076379299163818},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19066733121871948},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15660229325294495},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10338816046714783},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09392052888870239},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3613424.3623796","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623796","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623796","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3613424.3623796","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613424.3623796","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613424.3623796","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"56th Annual IEEE/ACM International Symposium on Microarchitecture","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7890278530","display_name":null,"funder_award_id":"1956032","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389491888.pdf","grobid_xml":"https://content.openalex.org/works/W4389491888.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W1584260451","https://openalex.org/W1934458198","https://openalex.org/W1976658155","https://openalex.org/W2024197950","https://openalex.org/W2092160538","https://openalex.org/W2097778649","https://openalex.org/W2106573617","https://openalex.org/W2131019288","https://openalex.org/W2137453738","https://openalex.org/W2141273270","https://openalex.org/W2143020967","https://openalex.org/W2147758029","https://openalex.org/W2166293920","https://openalex.org/W2239632431","https://openalex.org/W2255548496","https://openalex.org/W2323777873","https://openalex.org/W2613970414","https://openalex.org/W2770572532","https://openalex.org/W2796933658","https://openalex.org/W2903035991","https://openalex.org/W2905380323","https://openalex.org/W2914982603","https://openalex.org/W2952265249","https://openalex.org/W2952343783","https://openalex.org/W2955155286","https://openalex.org/W2963047853","https://openalex.org/W3137537256","https://openalex.org/W3155543450","https://openalex.org/W3161081806","https://openalex.org/W3206534076","https://openalex.org/W4214757266","https://openalex.org/W4246166885","https://openalex.org/W4288057706"],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W3016859066","https://openalex.org/W5280335","https://openalex.org/W4200321003","https://openalex.org/W4400339423","https://openalex.org/W3215861253","https://openalex.org/W4252980856","https://openalex.org/W4200163172"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1,48,95],"are":[2,49,64],"one":[3],"of":[4,75,113,118],"the":[5,59,76,119],"rising":[6],"security":[7,127],"concerns":[8],"in":[9,110],"modern":[10],"computing":[11],"platforms.":[12],"Observing":[13],"this,":[14],"researchers":[15],"have":[16],"proposed":[17],"both":[18],"hardware-based":[19,44],"and":[20,40],"software-based":[21,62,78],"strategies":[22],"to":[23,46,52,58,85,90,105,133],"mitigate":[24],"side-channel":[25,47,94],"attacks,":[26],"targeting":[27],"not":[28],"only":[29],"on-chip":[30,41],"caches":[31],"but":[32],"also":[33],"other":[34],"hardware":[35],"components":[36],"like":[37],"memory":[38],"controllers":[39],"networks.":[42],"While":[43],"solutions":[45,63,79],"usually":[50],"costly":[51],"implement":[53],"as":[54,67],"they":[55,68],"require":[56],"modifications":[57],"underlying":[60],"hardware,":[61],"more":[65],"practical":[66],"can":[69,131],"work":[70],"on":[71,101],"unmodified":[72],"hardware.":[73],"One":[74],"recent":[77],"is":[80,116],"constant-time":[81,129],"programming,":[82],"which":[83],"tries":[84],"transform":[86],"an":[87,98,111],"input":[88],"program":[89],"be":[91,106],"protected":[92,107],"against":[93],"such":[96],"that":[97,115],"operation":[99],"working":[100],"a":[102,126],"data":[103],"element/block":[104],"would":[108],"execute":[109],"amount":[112],"time":[114],"independent":[117],"input.":[120],"Unfortunately,":[121],"while":[122],"quite":[123],"effective":[124],"from":[125],"angle,":[128],"programming":[130],"lead":[132],"severe":[134],"performance":[135],"penalties.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
