{"id":"https://openalex.org/W2296151933","doi":"https://doi.org/10.1145/2892208.2892230","title":"Sparse representation of implicit flows with applications to side-channel detection","display_name":"Sparse representation of implicit flows with applications to side-channel detection","publication_year":2016,"publication_date":"2016-03-14","ids":{"openalex":"https://openalex.org/W2296151933","doi":"https://doi.org/10.1145/2892208.2892230","mag":"2296151933"},"language":"en","primary_location":{"id":"doi:10.1145/2892208.2892230","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2892208.2892230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Conference on Compiler Construction","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058974258","display_name":"B. Dias Rodrigues","orcid":null},"institutions":[{"id":"https://openalex.org/I110200422","display_name":"Universidade Federal de Minas Gerais","ror":"https://ror.org/0176yjw32","country_code":"BR","type":"education","lineage":["https://openalex.org/I110200422"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Bruno Rodrigues","raw_affiliation_strings":["Federal University of Minas Gerais, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Minas Gerais, Brazil","institution_ids":["https://openalex.org/I110200422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078149140","display_name":"Fernando Magno Quint\u00e3o Pereira","orcid":"https://orcid.org/0000-0002-0375-1657"},"institutions":[{"id":"https://openalex.org/I110200422","display_name":"Universidade Federal de Minas Gerais","ror":"https://ror.org/0176yjw32","country_code":"BR","type":"education","lineage":["https://openalex.org/I110200422"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Fernando Magno Quint\u00e3o Pereira","raw_affiliation_strings":["Federal University of Minas Gerais, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Minas Gerais, Brazil","institution_ids":["https://openalex.org/I110200422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020557476","display_name":"Diego F. Aranha","orcid":"https://orcid.org/0000-0002-2457-0783"},"institutions":[{"id":"https://openalex.org/I181391015","display_name":"Universidade Estadual de Campinas (UNICAMP)","ror":"https://ror.org/04wffgt70","country_code":"BR","type":"education","lineage":["https://openalex.org/I181391015"]},{"id":"https://openalex.org/I4210148978","display_name":"Hospital de Cl\u00ednicas da Unicamp","ror":"https://ror.org/05g89bp20","country_code":"BR","type":"healthcare","lineage":["https://openalex.org/I4210148978"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Diego F. Aranha","raw_affiliation_strings":["UNICAMP, Brazil"],"affiliations":[{"raw_affiliation_string":"UNICAMP, Brazil","institution_ids":["https://openalex.org/I4210148978","https://openalex.org/I181391015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058974258"],"corresponding_institution_ids":["https://openalex.org/I110200422"],"apc_list":null,"apc_paid":null,"fwci":15.9021,"has_fulltext":false,"cited_by_count":78,"citation_normalized_percentile":{"value":0.9898049,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"110","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7112646102905273},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.6777385473251343},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.666976273059845},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5585668683052063},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5227760672569275},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5140761137008667},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5064767599105835},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4817526340484619},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4614947736263275},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45872801542282104},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.458246648311615},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4435526430606842},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.42699509859085083},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.4248318672180176},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4103242754936218},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17348229885101318},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.15390029549598694},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13682380318641663}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7112646102905273},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.6777385473251343},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.666976273059845},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5585668683052063},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5227760672569275},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5140761137008667},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5064767599105835},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4817526340484619},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4614947736263275},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45872801542282104},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.458246648311615},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4435526430606842},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.42699509859085083},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.4248318672180176},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4103242754936218},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17348229885101318},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.15390029549598694},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13682380318641663},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2892208.2892230","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2892208.2892230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Conference on Compiler Construction","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320320997","display_name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","ror":"https://ror.org/02ddkpn78"},{"id":"https://openalex.org/F4320322025","display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","ror":"https://ror.org/03swz6y49"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W163795935","https://openalex.org/W186684821","https://openalex.org/W1488058190","https://openalex.org/W1522228241","https://openalex.org/W1526774512","https://openalex.org/W1529111398","https://openalex.org/W1531820677","https://openalex.org/W1533386851","https://openalex.org/W1551330847","https://openalex.org/W1613874182","https://openalex.org/W1871311856","https://openalex.org/W1910751411","https://openalex.org/W1982205631","https://openalex.org/W1983142587","https://openalex.org/W1986441862","https://openalex.org/W1988949749","https://openalex.org/W1990087033","https://openalex.org/W1997775274","https://openalex.org/W2007845800","https://openalex.org/W2012131382","https://openalex.org/W2027822753","https://openalex.org/W2034527657","https://openalex.org/W2038173123","https://openalex.org/W2053250078","https://openalex.org/W2056778557","https://openalex.org/W2064617810","https://openalex.org/W2065826255","https://openalex.org/W2073997098","https://openalex.org/W2076807040","https://openalex.org/W2076840859","https://openalex.org/W2083582440","https://openalex.org/W2085050643","https://openalex.org/W2108535402","https://openalex.org/W2111996055","https://openalex.org/W2115595690","https://openalex.org/W2127761335","https://openalex.org/W2129278597","https://openalex.org/W2132350687","https://openalex.org/W2135654257","https://openalex.org/W2144019036","https://openalex.org/W2144344516","https://openalex.org/W2149465027","https://openalex.org/W2153185479","https://openalex.org/W2170656359","https://openalex.org/W2463318917","https://openalex.org/W2610592684","https://openalex.org/W2949317607","https://openalex.org/W3145846323","https://openalex.org/W4285719527","https://openalex.org/W6633854507","https://openalex.org/W6736934019"],"related_works":["https://openalex.org/W1549956274","https://openalex.org/W2151163382","https://openalex.org/W2052160877","https://openalex.org/W2144344516","https://openalex.org/W1484884871","https://openalex.org/W94523631","https://openalex.org/W3157379933","https://openalex.org/W2347387062","https://openalex.org/W1618050740","https://openalex.org/W55907213"],"abstract_inverted_index":{"Information":[0],"flow":[1,45,66,78,206],"analyses":[2,79],"traditionally":[3],"use":[4],"the":[5,48,53,61,95,113,133,242,246],"Program":[6],"Dependence":[7],"Graph":[8],"(PDG)":[9],"as":[10],"a":[11,56,81,89,109,123,136,179,219],"supporting":[12],"data-structure.":[13],"This":[14,68,117],"graph":[15],"relies":[16],"on":[17,94],"Ferrante":[18,209],"et":[19,210],"al.'s":[20,211],"notion":[21,83],"of":[22,29,33,84,91,97,101,112,126,135,150,222,245],"control":[23,65],"dependences":[24,107],"to":[25,75,122,154,176],"represent":[26],"implicit":[27,44,85,205],"flows":[28],"information.":[30],"A":[31],"limitation":[32],"this":[34],"approach":[35],"is":[36,73,119],"that":[37,71,181],"it":[38,72,226,239],"may":[39],"create":[40],"O(|I|":[41],"x":[42],"|E|)":[43],"edges":[46,62,92,207],"in":[47,55,63,108,128,185,196,218,232,236],"PDG,":[49],"where":[50],"I":[51],"are":[52,60],"instructions":[54,195],"program,":[57],"and":[58,147,162,201,238],"E":[59],"its":[64,140],"graph.":[67],"paper":[69],"shows":[70],"possible":[74,120],"compute":[76],"information":[77],"using":[80],"different":[82],"dependence,":[86],"which":[87,158],"yields":[88],"number":[90,96],"linear":[93],"definitions":[98],"plus":[99],"uses":[100],"variables.":[102],"Our":[103,142],"algorithm":[104,143],"computes":[105],"these":[106],"single":[110],"traversal":[111],"program's":[114],"dominance":[115],"tree.":[116],"efficiency":[118],"due":[121],"key":[124],"property":[125],"programs":[127,190],"Static":[129],"Single":[130],"Assignment":[131],"form:":[132],"definition":[134],"variable":[137],"dominates":[138],"all":[139],"uses.":[141],"correctly":[144],"implements":[145],"Hunt":[146],"Sands":[148],"system":[149],"security":[151],"types.":[152],"Contrary":[153],"their":[155],"original":[156],"formulation,":[157],"required":[159],"O(IxI)":[160],"space":[161],"time":[163],"for":[164],"structured":[165],"programs,":[166],"we":[167],"require":[168],"only":[169],"O(I).":[170],"We":[171],"have":[172],"used":[173],"our":[174],"ideas":[175],"build":[177],"FlowTracker,":[178],"tool":[180],"uncovers":[182],"side-channel":[183],"vulnerabilities":[184],"cryptographic":[186],"algorithms.":[187],"FlowTracker":[188,213],"handles":[189],"with":[191],"over":[192],"one-million":[193],"assembly":[194],"less":[197,204],"than":[198,208],"200":[199],"seconds,":[200],"creates":[202],"24%":[203],"technique.":[212],"has":[214,227,240],"detected":[215],"an":[216],"issue":[217,235],"constant-time":[220],"implementation":[221],"Elliptic":[223],"Curve":[224],"Cryptography;":[225],"found":[228],"several":[229],"time-variant":[230],"constructions":[231],"OpenSSL,":[233],"one":[234],"TrueCrypt":[237],"validated":[241],"isochronous":[243],"behavior":[244],"NaCl":[247],"library.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":4}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
