{"id":"https://openalex.org/W2533642151","doi":"https://doi.org/10.1145/2976749.2978299","title":"On Code Execution Tracking via Power Side-Channel","display_name":"On Code Execution Tracking via Power Side-Channel","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2533642151","doi":"https://doi.org/10.1145/2976749.2978299","mag":"2533642151"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978299","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978299","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978299&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2978299&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038764214","display_name":"Yannan Liu","orcid":"https://orcid.org/0000-0002-7379-3385"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yannan Liu","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005629203","display_name":"Lingxiao Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingxiao Wei","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030073853","display_name":"Zhe Zhou","orcid":"https://orcid.org/0000-0003-4879-6258"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Zhou","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008237643","display_name":"Kehuan Zhang","orcid":"https://orcid.org/0000-0003-1519-0057"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kehuan Zhang","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088556682","display_name":"Qiang Xu","orcid":"https://orcid.org/0000-0001-6747-126X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Xu","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038764214"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":11.4847,"has_fulltext":true,"cited_by_count":87,"citation_normalized_percentile":{"value":0.98419214,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1019","last_page":"1031"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8785741329193115},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8559306859970093},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5997781753540039},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5943940281867981},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5212543606758118},{"id":"https://openalex.org/keywords/microcode","display_name":"Microcode","score":0.502479076385498},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.48615357279777527},{"id":"https://openalex.org/keywords/viterbi-algorithm","display_name":"Viterbi algorithm","score":0.4760172963142395},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4181019067764282},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.41415148973464966},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.31288647651672363},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3082616329193115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18775001168251038},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15934139490127563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15076959133148193}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8785741329193115},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8559306859970093},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5997781753540039},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5943940281867981},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5212543606758118},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.502479076385498},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.48615357279777527},{"id":"https://openalex.org/C60582962","wikidata":"https://www.wikidata.org/wiki/Q83886","display_name":"Viterbi algorithm","level":3,"score":0.4760172963142395},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4181019067764282},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.41415148973464966},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.31288647651672363},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3082616329193115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18775001168251038},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15934139490127563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15076959133148193},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978299","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978299","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978299&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2976749.2978299","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978299","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978299&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1051257415","display_name":null,"funder_award_id":"61432017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2122852399","display_name":null,"funder_award_id":"61532017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3313645928","display_name":null,"funder_award_id":"4055049","funder_id":"https://openalex.org/F4320322942","funder_display_name":"Chinese University of Hong Kong"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5495793000","display_name":null,"funder_award_id":"CNS-1513107","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6539836586","display_name":null,"funder_award_id":"61472358","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6822108733","display_name":null,"funder_award_id":"61572415","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8458747680","display_name":"II-New: SC-CAN: South Carolina's Wireless Communication and Airborne Networking Collaboratory","funder_award_id":"1513107","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8593182723","display_name":null,"funder_award_id":"61432017, 61532017, 61572415, 61472358","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322942","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2533642151.pdf","grobid_xml":"https://content.openalex.org/works/W2533642151.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W65544044","https://openalex.org/W70478248","https://openalex.org/W89002490","https://openalex.org/W1429241971","https://openalex.org/W1490557050","https://openalex.org/W1544522602","https://openalex.org/W1562542037","https://openalex.org/W1779923173","https://openalex.org/W1824405704","https://openalex.org/W1827849520","https://openalex.org/W1968002620","https://openalex.org/W1969501726","https://openalex.org/W1989305905","https://openalex.org/W2000470949","https://openalex.org/W2004456327","https://openalex.org/W2008230196","https://openalex.org/W2009190171","https://openalex.org/W2037734761","https://openalex.org/W2037758572","https://openalex.org/W2039845393","https://openalex.org/W2077688407","https://openalex.org/W2094892879","https://openalex.org/W2109219878","https://openalex.org/W2110941647","https://openalex.org/W2124631616","https://openalex.org/W2125838338","https://openalex.org/W2127637733","https://openalex.org/W2138517425","https://openalex.org/W2141389113","https://openalex.org/W2148686658","https://openalex.org/W2154909745","https://openalex.org/W2159216827","https://openalex.org/W2161067956","https://openalex.org/W2355550369","https://openalex.org/W2395584252","https://openalex.org/W2406734572","https://openalex.org/W3099514962","https://openalex.org/W3145074154","https://openalex.org/W4247225876","https://openalex.org/W4247903245","https://openalex.org/W6768779726","https://openalex.org/W6776535907"],"related_works":["https://openalex.org/W1966431236","https://openalex.org/W608147619","https://openalex.org/W1984676852","https://openalex.org/W2068967940","https://openalex.org/W270731569","https://openalex.org/W4252104358","https://openalex.org/W2062160093","https://openalex.org/W2025981307","https://openalex.org/W1998626163","https://openalex.org/W2056006243"],"abstract_inverted_index":{"With":[0],"the":[1,28,108,123,136,140,150],"proliferation":[2],"of":[3,5,52,139],"Internet":[4],"Things,":[6],"there":[7],"is":[8,50,74,170],"a":[9,96,116,130,155,167],"growing":[10],"interest":[11],"in":[12],"embedded":[13,56,60],"system":[14,87],"attacks,":[15,49],"e.g.,":[16],"key":[17,37],"extraction":[18,38],"attacks":[19,39],"and":[20,40,65,111,121,158],"firmware":[21,47],"modification":[22,48,88],"attacks.":[23],"Code":[24],"execution":[25,80,99,110,152,162],"tracking,":[26],"as":[27,85,89],"first":[29],"step":[30],"to":[31,41,76,148],"locate":[32],"vulnerable":[33],"instruction":[34,127,169],"pieces":[35],"for":[36],"conduct":[42],"control-flow":[43],"integrity":[44],"checking":[45],"against":[46],"therefore":[51],"great":[53],"value.":[54],"Because":[55],"systems,":[57,61],"especially":[58],"legacy":[59],"have":[62],"limited":[63],"resources":[64],"may":[66],"not":[67],"support":[68],"software":[69],"or":[70],"hardware":[71],"update,":[72],"it":[73],"important":[75],"design":[77],"low-cost":[78],"code":[79,98,109,161],"tracking":[81,100],"methods":[82],"that":[83],"require":[84],"little":[86],"possible.":[90],"In":[91],"this":[92],"work,":[93],"we":[94,106,145],"propose":[95],"non-intrusive":[97],"solution":[101],"via":[102],"power-side":[103],"channel,":[104],"wherein":[105],"represent":[107],"its":[112],"power":[113,137],"consumption":[114,138],"with":[115,129,154],"revised":[117,131],"hidden":[118],"Markov":[119],"model":[120],"recover":[122,149],"most":[124],"likely":[125],"executed":[126],"sequence":[128],"Viterbi":[132],"algorithm.":[133],"By":[134],"observing":[135],"microcontroller":[141],"unit":[142],"during":[143],"execution,":[144],"are":[146],"able":[147],"program":[151],"flow":[153],"high":[156],"accuracy":[157],"detect":[159],"abnormal":[160],"behavior":[163],"even":[164],"when":[165],"only":[166],"single":[168],"modified.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
