{"id":"https://openalex.org/W2565033795","doi":"https://doi.org/10.1145/3029806.3029836","title":"Fault Attacks on Encrypted General Purpose Compute Platforms","display_name":"Fault Attacks on Encrypted General Purpose Compute Platforms","publication_year":2017,"publication_date":"2017-03-20","ids":{"openalex":"https://openalex.org/W2565033795","doi":"https://doi.org/10.1145/3029806.3029836","mag":"2565033795"},"language":"en","primary_location":{"id":"doi:10.1145/3029806.3029836","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034542496","display_name":"Robert Buhren","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Robert Buhren","raw_affiliation_strings":["Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061975828","display_name":"Shay Gueron","orcid":"https://orcid.org/0000-0002-9145-7609"},"institutions":[{"id":"https://openalex.org/I4210104622","display_name":"Intel (Israel)","ror":"https://ror.org/027t2s119","country_code":"IL","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210104622"]},{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]},{"id":"https://openalex.org/I80687555","display_name":"Israel Electric (Israel)","ror":"https://ror.org/01p8dnv11","country_code":"IL","type":"company","lineage":["https://openalex.org/I80687555"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shay Gueron","raw_affiliation_strings":["University of Haifa &amp; Intel Corporation, Israel, Israel"],"affiliations":[{"raw_affiliation_string":"University of Haifa &amp; Intel Corporation, Israel, Israel","institution_ids":["https://openalex.org/I80687555","https://openalex.org/I4210104622","https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074527655","display_name":"Jan Nordholz","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Nordholz","raw_affiliation_strings":["Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010909817","display_name":"Julian Vetter","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Julian Vetter","raw_affiliation_strings":["Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034542496"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":1.4549,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86202725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"204"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8310708999633789},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8267885446548462},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.811396598815918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7606329321861267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6975133419036865},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.5187504291534424},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.508878231048584},{"id":"https://openalex.org/keywords/encryption-software","display_name":"Encryption software","score":0.49736860394477844},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4701550006866455},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.44109103083610535},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4380805492401123},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.43494030833244324},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40983423590660095},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.338672399520874},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.19184213876724243},{"id":"https://openalex.org/keywords/extended-memory","display_name":"Extended memory","score":0.15744400024414062},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.0812484622001648}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8310708999633789},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8267885446548462},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.811396598815918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7606329321861267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6975133419036865},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.5187504291534424},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.508878231048584},{"id":"https://openalex.org/C158104961","wikidata":"https://www.wikidata.org/wiki/Q5375622","display_name":"Encryption software","level":5,"score":0.49736860394477844},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4701550006866455},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.44109103083610535},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4380805492401123},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.43494030833244324},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40983423590660095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.338672399520874},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.19184213876724243},{"id":"https://openalex.org/C171675096","wikidata":"https://www.wikidata.org/wiki/Q1143380","display_name":"Extended memory","level":4,"score":0.15744400024414062},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.0812484622001648}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3029806.3029836","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W86845558","https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1552695147","https://openalex.org/W1555558540","https://openalex.org/W1794453460","https://openalex.org/W1829732909","https://openalex.org/W1934458198","https://openalex.org/W1964281299","https://openalex.org/W1969074822","https://openalex.org/W1993520820","https://openalex.org/W1997933199","https://openalex.org/W2110941647","https://openalex.org/W2133383336","https://openalex.org/W2144183173","https://openalex.org/W2144219822","https://openalex.org/W2156368296","https://openalex.org/W2160914149","https://openalex.org/W2162653919","https://openalex.org/W2175377689","https://openalex.org/W2296602564","https://openalex.org/W2397035252"],"related_works":["https://openalex.org/W2381892741","https://openalex.org/W2393322167","https://openalex.org/W2376666149","https://openalex.org/W2111426419","https://openalex.org/W4214720436","https://openalex.org/W2160856941","https://openalex.org/W3148250953","https://openalex.org/W2545296949","https://openalex.org/W2366021036","https://openalex.org/W2116268162"],"abstract_inverted_index":{"Adversaries":[0],"with":[1],"physical":[2],"access":[3],"to":[4,15,38,42,144,164],"a":[5,98,115,122,132,151],"target":[6],"platform":[7],"can":[8],"perform":[9],"cold":[10],"boot":[11],"or":[12],"DMA":[13],"attacks":[14],"extract":[16,145],"sensitive":[17],"data":[18],"from":[19,76],"the":[20,40,53,60,90,146],"RAM.":[21],"To":[22,109],"prevent":[23,165],"such":[24],"attacks,":[25],"hardware":[26],"vendors":[27],"announced":[28],"respective":[29],"processor":[30],"extensions.":[31],"AMD's":[32,127],"extension":[33],"SME":[34],"will":[35,51],"provide":[36],"means":[37],"encrypt":[39],"RAM":[41,77,83],"protect":[43,52],"security-relevant":[44],"assets":[45],"that":[46,68,157],"reside":[47],"there.":[48],"The":[49],"encryption":[50,95,119,160],"user's":[54],"content":[55,81],"against":[56],"passive":[57],"eavesdropping.":[58],"However,":[59],"level":[61],"of":[62,150],"protection":[63,100],"it":[64],"provides":[65],"in":[66,82,102],"scenarios":[67],"involve":[69],"an":[70,106],"adversary":[71],"who":[72],"cannot":[73],"only":[74],"read":[75],"but":[78],"also":[79],"change":[80],"is":[84,97,161],"less":[85],"clear.":[86],"This":[87],"paper":[88],"addresses":[89],"open":[91],"research":[92],"question":[93],"whether":[94],"alone":[96],"dependable":[99],"mechanism":[101],"practice":[103],"when":[104],"considering":[105],"active":[107,166],"adversary.":[108],"this":[110,137],"end,":[111],"we":[112,130,141],"first":[113],"build":[114],"software":[116],"based":[117],"memory":[118,159],"solution":[120],"on":[121,136],"desktop":[123],"system":[124],"which":[125,140],"mimics":[126],"SME.":[128],"Subsequently,":[129],"demonstrate":[131],"proof-of-concept":[133],"fault":[134],"attack":[135],"system,":[138],"by":[139],"are":[142],"able":[143],"private":[147],"RSA":[148],"key":[149],"GnuPG":[152],"user.":[153],"Our":[154],"work":[155],"suggests":[156],"transparent":[158],"not":[162],"enough":[163],"attacks.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
