{"id":"https://openalex.org/W4391604029","doi":"https://doi.org/10.1145/3645109","title":"Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures","display_name":"Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures","publication_year":2024,"publication_date":"2024-02-07","ids":{"openalex":"https://openalex.org/W4391604029","doi":"https://doi.org/10.1145/3645109"},"language":"en","primary_location":{"id":"doi:10.1145/3645109","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3645109","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3645109","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3645109","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100680951","display_name":"Jiliang Zhang","orcid":"https://orcid.org/0000-0001-8712-2964"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiliang Zhang","raw_affiliation_strings":["Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100604558","display_name":"Congcong Chen","orcid":"https://orcid.org/0000-0002-5453-7984"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Congcong Chen","raw_affiliation_strings":["Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103282039","display_name":"Jinhua Cui","orcid":"https://orcid.org/0000-0001-5716-4995"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhua Cui","raw_affiliation_strings":["Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087894632","display_name":"Keqin Li","orcid":"https://orcid.org/0000-0001-5224-4048"},"institutions":[{"id":"https://openalex.org/I1327163397","display_name":"State University of New York","ror":"https://ror.org/01q1z8k08","country_code":"US","type":"education","lineage":["https://openalex.org/I1327163397"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keqin Li","raw_affiliation_strings":["State University of New York, New York, USA"],"affiliations":[{"raw_affiliation_string":"State University of New York, New York, USA","institution_ids":["https://openalex.org/I1327163397"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100680951"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":10.5173,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.98565661,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"56","issue":"7","first_page":"1","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.9116318821907043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8689514398574829},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5893648862838745},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5742697715759277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48811468482017517},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.4176235496997833},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4035186469554901},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31938937306404114},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21524906158447266}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.9116318821907043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8689514398574829},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5893648862838745},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5742697715759277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48811468482017517},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.4176235496997833},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4035186469554901},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31938937306404114},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21524906158447266}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3645109","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3645109","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3645109","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3645109","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3645109","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3645109","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1334762759","display_name":null,"funder_award_id":"6212202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2376276132","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2830183398","display_name":null,"funder_award_id":"No. 2023JJ40160","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4757893089","display_name":null,"funder_award_id":"U20A20202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G485163565","display_name":null,"funder_award_id":"62122023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249413651","display_name":null,"funder_award_id":"U20A2020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6764517672","display_name":null,"funder_award_id":"U20A202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7591319378","display_name":null,"funder_award_id":"No. 62122023 and U20A20202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391604029.pdf","grobid_xml":"https://content.openalex.org/works/W4391604029.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1447175589","https://openalex.org/W1492601037","https://openalex.org/W1592889082","https://openalex.org/W1837443519","https://openalex.org/W2074701325","https://openalex.org/W2091995912","https://openalex.org/W2299561166","https://openalex.org/W2507765405","https://openalex.org/W2562036180","https://openalex.org/W2586555532","https://openalex.org/W2595350342","https://openalex.org/W2785607367","https://openalex.org/W2807403537","https://openalex.org/W2809355808","https://openalex.org/W2868863044","https://openalex.org/W2886430483","https://openalex.org/W2899703500","https://openalex.org/W2981343730","https://openalex.org/W2982844362","https://openalex.org/W2985509521","https://openalex.org/W2994651626","https://openalex.org/W3036003802","https://openalex.org/W3100860658","https://openalex.org/W3103451427","https://openalex.org/W3121963220","https://openalex.org/W3128086255","https://openalex.org/W3160448675","https://openalex.org/W3181370975","https://openalex.org/W4231359931","https://openalex.org/W4233119454","https://openalex.org/W4247198503","https://openalex.org/W4295815396","https://openalex.org/W4382999345"],"related_works":["https://openalex.org/W1971956962","https://openalex.org/W2188560665","https://openalex.org/W2887442533","https://openalex.org/W4379116144","https://openalex.org/W2888014022","https://openalex.org/W4297042454","https://openalex.org/W3028997697","https://openalex.org/W3008088605","https://openalex.org/W3192308411","https://openalex.org/W4387031668"],"abstract_inverted_index":{"Microarchitectural":[0],"vulnerabilities,":[1],"such":[2,37],"as":[3],"Meltdown":[4],"and":[5,17,34,54,56,70,88,106,109,125,134,141,165,186,190],"Spectre,":[6],"exploit":[7],"subtle":[8],"microarchitecture":[9],"state":[10],"to":[11,92,149],"steal":[12],"the":[13,20,31,60,72,98,123,131,138,142,155,187],"user\u2019s":[14],"secret":[15],"data":[16],"even":[18],"compromise":[19],"operating":[21],"systems.":[22],"In":[23,63,114],"recent":[24],"years,":[25],"considerable":[26],"discussion":[27],"lies":[28],"in":[29],"understanding":[30],"attack-defense":[32],"mechanisms":[33],"exploitability":[35],"of":[36,49,59,80,122,157,183],"vulnerabilities.":[38],"Unfortunately,":[39],"there":[40],"have":[41],"been":[42],"few":[43],"investigations":[44],"into":[45],"a":[46,119],"systematic":[47],"elaboration":[48],"threat":[50],"models,":[51],"attack":[52,94,139,188],"scenarios":[53],"requirements,":[55],"defense":[57,163],"targets":[58],"resulting":[61],"attacks.":[62],"this":[64,68],"article,":[65],"we":[66,101,116,178],"fill":[67],"gap":[69],"make":[71],"following":[73],"contributions.":[74],"We":[75,152,167],"first":[76],"propose":[77,179],"two":[78],"sets":[79],"taxonomies":[81,99],"for":[82,193],"classifying":[83],"microarchitectural":[84],"timing":[85],"side-channel":[86],"attacks":[87,105],"their":[89,112],"countermeasures":[90,185],"according":[91],"various":[93],"conditions.":[95],"Based":[96],"on":[97,174],"proposed,":[100],"then":[102],"review":[103],"published":[104],"existing":[107,184],"defenses":[108,159],"systematically":[110],"analyze":[111],"internals.":[113],"particular,":[115],"also":[117,168],"provide":[118],"comprehensive":[120],"analysis":[121],"similarities":[124],"differences":[126],"among":[127],"those":[128,158],"attacks,":[129],"uncovering":[130],"corresponding":[132,170],"practicality":[133],"severity":[135],"by":[136],"identifying":[137],"targets/platforms":[140],"security":[143],"boundaries":[144],"that":[145],"can":[146],"be":[147],"bypassed":[148],"reveal":[150],"information.":[151],"further":[153],"examine":[154],"scalability":[156],"through":[160],"specifying":[161],"expected":[162],"goals":[164],"costs.":[166],"discuss":[169,191],"detection":[171],"methods":[172],"based":[173],"different":[175],"classifications.":[176],"Finally,":[177],"several":[180],"key":[181],"challenges":[182],"trends,":[189],"directions":[192],"future":[194],"research.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
