{"id":"https://openalex.org/W4399859716","doi":"https://doi.org/10.1145/3672560","title":"ZPredict: ML-Based IPID Side-channel Measurements","display_name":"ZPredict: ML-Based IPID Side-channel Measurements","publication_year":2024,"publication_date":"2024-06-20","ids":{"openalex":"https://openalex.org/W4399859716","doi":"https://doi.org/10.1145/3672560"},"language":"en","primary_location":{"id":"doi:10.1145/3672560","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672560","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672560","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3672560","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075110050","display_name":"Haya Schulmann","orcid":"https://orcid.org/0000-0002-8130-0472"},"institutions":[{"id":"https://openalex.org/I114090438","display_name":"Goethe University Frankfurt","ror":"https://ror.org/04cvxnb49","country_code":"DE","type":"education","lineage":["https://openalex.org/I114090438"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Haya Schulmann","raw_affiliation_strings":["Computer science, Goethe-University Frankfurt, Frankfurt am Main, Germany and ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","ATHENE National Research Center for Applied Cybersecurity,  Darmstadt Germany","Computer science, Goethe-University Frankfurt, Frankfurt am Main, Germany ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany"],"affiliations":[{"raw_affiliation_string":"Computer science, Goethe-University Frankfurt, Frankfurt am Main, Germany and ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","institution_ids":["https://openalex.org/I114090438"]},{"raw_affiliation_string":"ATHENE National Research Center for Applied Cybersecurity,  Darmstadt Germany","institution_ids":[]},{"raw_affiliation_string":"Computer science, Goethe-University Frankfurt, Frankfurt am Main, Germany ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","institution_ids":["https://openalex.org/I114090438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027103165","display_name":"Shujie Zhao","orcid":"https://orcid.org/0009-0000-4932-4266"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Shujie Zhao","raw_affiliation_strings":["Cybersecurity Analytics and Defences, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Germany and ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","Cybersecurity Analytics and Defences, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Germany ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","ATHENE National Research Center for Applied Cybersecurity,  Darmstadt Germany"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Analytics and Defences, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Germany and ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","institution_ids":["https://openalex.org/I4210133470"]},{"raw_affiliation_string":"Cybersecurity Analytics and Defences, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Germany ATHENE National Research Center for Applied Cybersecurity, Darmstadt Germany","institution_ids":["https://openalex.org/I4210133470"]},{"raw_affiliation_string":"ATHENE National Research Center for Applied Cybersecurity,  Darmstadt Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075110050"],"corresponding_institution_ids":["https://openalex.org/I114090438"],"apc_list":null,"apc_paid":null,"fwci":0.7011,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70215365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"27","issue":"4","first_page":"1","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.650132417678833},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.47979241609573364},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.35741573572158813},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3375222682952881},{"id":"https://openalex.org/keywords/environmental-science","display_name":"Environmental science","score":0.3212682604789734},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19834360480308533},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19483759999275208}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.650132417678833},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.47979241609573364},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.35741573572158813},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3375222682952881},{"id":"https://openalex.org/C39432304","wikidata":"https://www.wikidata.org/wiki/Q188847","display_name":"Environmental science","level":0,"score":0.3212682604789734},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19834360480308533},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19483759999275208},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3672560","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672560","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672560","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},{"id":"pmh:oai:null:publica/473939","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/473939","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":{"id":"doi:10.1145/3672560","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3672560","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3672560","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399859716.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W25350463","https://openalex.org/W797440412","https://openalex.org/W1590810061","https://openalex.org/W1838445804","https://openalex.org/W1867219652","https://openalex.org/W1954338761","https://openalex.org/W1994795387","https://openalex.org/W2001414605","https://openalex.org/W2040395995","https://openalex.org/W2041453110","https://openalex.org/W2117175761","https://openalex.org/W2133656166","https://openalex.org/W2153486199","https://openalex.org/W2165174838","https://openalex.org/W2171861685","https://openalex.org/W2288359499","https://openalex.org/W2502406077","https://openalex.org/W2548400217","https://openalex.org/W2551524776","https://openalex.org/W2588574340","https://openalex.org/W2746395603","https://openalex.org/W2793301585","https://openalex.org/W2888853184","https://openalex.org/W2912509607","https://openalex.org/W2913698492","https://openalex.org/W2914417854","https://openalex.org/W2965279841","https://openalex.org/W3151647019","https://openalex.org/W3159998597","https://openalex.org/W4287875395","https://openalex.org/W4288057715","https://openalex.org/W4307020398","https://openalex.org/W4321993631","https://openalex.org/W4392964112","https://openalex.org/W6773449081"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2324615561","https://openalex.org/W2086120259","https://openalex.org/W2136687465","https://openalex.org/W2390279801","https://openalex.org/W3016859066","https://openalex.org/W2245170124"],"abstract_inverted_index":{"Network":[0],"reconnaissance":[1],"and":[2,12,20,35,134,148,178,222,232],"measurements":[3,23,51],"play":[4],"a":[5,46,108,120,189,206],"central":[6],"role":[7],"in":[8,176,215],"improving":[9],"Internet":[10,158],"security":[11],"are":[13],"important":[14],"for":[15,49,91],"understanding":[16],"the":[17,28,33,36,39,54,61,76,101,127,165,168,183,243],"current":[18,65],"deployments":[19],"trends.":[21],"Such":[22],"often":[24],"require":[25],"coordination":[26],"with":[27,246],"measured":[29],"target.":[30],"This":[31,117],"limits":[32],"scalability":[34],"coverage":[37],"of":[38,79,103,113,130,209],"existing":[40,104],"proposals.":[41],"IP":[42],"Identification":[43],"(IPID)":[44],"provides":[45],"side":[47],"channel":[48],"remote":[50],"without":[52],"requiring":[53],"targets":[55],"to":[56,72,89,99,125,193,235],"install":[57],"agents":[58],"or":[59,83,201],"visit":[60],"measurement":[62],"infrastructure.":[63],"However,":[64],"IPID-based":[66],"techniques":[67,105],"have":[68],"technical":[69],"limitations":[70,102],"due":[71],"their":[73],"reliance":[74],"on":[75,151,205],"idealistic":[77],"assumption":[78],"stable":[80],"IPID":[81,114,131,137,153,180],"changes":[82,133],"prior":[84],"knowledge,":[85],"making":[86],"them":[87,150],"challenging":[88],"adopt":[90],"practical":[92],"measurements.":[93,247],"In":[94],"this":[95],"work,":[96],"we":[97,143,187],"aim":[98],"tackle":[100],"by":[106],"introducing":[107],"novel":[109],"approach:":[110],"predictive":[111,185],"analysis":[112],"counter":[115,132],"behavior.":[116],"involves":[118],"utilizing":[119],"machine":[121],"learning":[122],"(ML)":[123],"model":[124,172],"understand":[126],"historical":[128],"patterns":[129],"predict":[135],"future":[136],"values.":[138,181],"To":[139],"validate":[140],"our":[141],"approach,":[142],"implement":[144,188],"six":[145,166],"ML":[146],"models":[147],"evaluate":[149],"realistic":[152],"data":[154],"collected":[155],"from":[156],"4,698":[157],"sources.":[159],"Our":[160,203,227],"evaluations":[161],"demonstrate":[162],"that":[163],"among":[164],"models,":[167],"Gaussian":[169],"Process":[170],"(GP)":[171],"has":[173],"superior":[174],"accuracy":[175],"tracking":[177],"predicting":[179],"Using":[182],"GP-based":[184],"analysis,":[186],"tool,":[190],"called":[191],"ZPredict,":[192],"infer":[194],"various":[195],"favorable":[196],"information":[197],"about":[198],"target":[199],"networks":[200],"servers.":[202],"evaluation":[204],"large":[207],"dataset":[208],"public":[210],"servers":[211],"demonstrates":[212],"its":[213],"effectiveness":[214],"idle":[216],"port":[217],"scanning,":[218],"measuring":[219],"Russian":[220],"censorship,":[221],"inferring":[223],"Source":[224],"Address":[225],"Validation.":[226],"study":[228],"methodology":[229],"is":[230],"ethical":[231],"was":[233],"developed":[234],"mitigate":[236],"any":[237],"potential":[238],"harm,":[239],"taking":[240],"into":[241],"account":[242],"concerns":[244],"associated":[245]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
