{"id":"https://openalex.org/W2909521345","doi":"https://doi.org/10.1145/3287624.3287694","title":"TAD","display_name":"TAD","publication_year":2019,"publication_date":"2019-01-18","ids":{"openalex":"https://openalex.org/W2909521345","doi":"https://doi.org/10.1145/3287624.3287694","mag":"2909521345"},"language":"en","primary_location":{"id":"doi:10.1145/3287624.3287694","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3287694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dr.ntu.edu.sg/bitstream/10356/145789/2/2019%20Fell%20-%20TAD%20Time%20Side-Channel%20Attack%20Defense%20of%20Obfuscated%20Source%20Code.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075302768","display_name":"Alexander Fell","orcid":"https://orcid.org/0000-0002-9955-2643"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Alexander Fell","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048934735","display_name":"Thinh Hung Pham","orcid":"https://orcid.org/0000-0003-1836-3363"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hung Thinh Pham","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002694277","display_name":"Siew-Kei Lam","orcid":"https://orcid.org/0000-0002-8346-2635"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siew-Kei Lam","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075302768"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":1.0116,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8214034,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"58","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8537776470184326},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8381732702255249},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6736065149307251},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.669954240322113},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5835378170013428},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5050202012062073},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4915338456630707},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4282165765762329},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4183427393436432},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3279118537902832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12133705615997314}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8537776470184326},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8381732702255249},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6736065149307251},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.669954240322113},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5835378170013428},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5050202012062073},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4915338456630707},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4282165765762329},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4183427393436432},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3279118537902832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12133705615997314},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3287624.3287694","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3287694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/145789","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/145789","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/145789/2/2019%20Fell%20-%20TAD%20Time%20Side-Channel%20Attack%20Defense%20of%20Obfuscated%20Source%20Code.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/145789","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/145789","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/145789/2/2019%20Fell%20-%20TAD%20Time%20Side-Channel%20Attack%20Defense%20of%20Obfuscated%20Source%20Code.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G277544474","display_name":null,"funder_award_id":"NRF2016","funder_id":"https://openalex.org/F4320320709","funder_display_name":"National Research Foundation Singapore"},{"id":"https://openalex.org/G5858312513","display_name":null,"funder_award_id":"NRF2016NCR-NCR001-006","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G6583536656","display_name":null,"funder_award_id":"NRF2016NCR-NCR001-006","funder_id":"https://openalex.org/F4320320709","funder_display_name":"National Research Foundation Singapore"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2909521345.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W50107694","https://openalex.org/W1138977110","https://openalex.org/W1531820677","https://openalex.org/W1554359822","https://openalex.org/W1740185811","https://openalex.org/W1811355673","https://openalex.org/W1926480282","https://openalex.org/W1995875735","https://openalex.org/W1996360405","https://openalex.org/W2002340699","https://openalex.org/W2029236670","https://openalex.org/W2064435654","https://openalex.org/W2082594235","https://openalex.org/W2110429202","https://openalex.org/W2117636524","https://openalex.org/W2128859735","https://openalex.org/W2142633847","https://openalex.org/W2146567535","https://openalex.org/W2148986322","https://openalex.org/W2153185479","https://openalex.org/W2159609636","https://openalex.org/W2172060328","https://openalex.org/W2183353950","https://openalex.org/W2229758354","https://openalex.org/W2294648786","https://openalex.org/W2314464932","https://openalex.org/W2396513659","https://openalex.org/W2552182158","https://openalex.org/W2568033790","https://openalex.org/W2586432806","https://openalex.org/W2594353089","https://openalex.org/W2765801977","https://openalex.org/W2949177658","https://openalex.org/W2964011914","https://openalex.org/W3003623942","https://openalex.org/W3007127761","https://openalex.org/W4232836212","https://openalex.org/W6711917421"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W2132360941","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W4388820743","https://openalex.org/W2328675598","https://openalex.org/W2793135307","https://openalex.org/W2532550198","https://openalex.org/W3134235726"],"abstract_inverted_index":{"Program":[0],"obfuscation":[1,55],"is":[2,96,121,153,161],"widely":[3],"used":[4],"to":[5,36,66,163],"protect":[6],"commercial":[7],"software":[8,64],"against":[9],"reverse-engineering.":[10],"However,":[11],"an":[12,27,112],"adversary":[13],"can":[14],"still":[15],"download,":[16],"disassemble":[17],"and":[18,31,60,157,166],"analyze":[19],"binaries":[20],"of":[21,53,70],"the":[22,43,51,116,145,150,164],"obfuscated":[23,92,167],"code":[24],"executed":[25],"on":[26,57,144],"embedded":[28,81],"System-on-Chip":[29],"(SoC),":[30],"by":[32,127,155],"correlating":[33],"execution":[34,109,138],"times":[35,110,139],"input":[37,113],"values,":[38],"extract":[39],"secret":[40],"information":[41,151],"from":[42],"program.":[44,114],"In":[45,115],"this":[46],"paper,":[47],"we":[48],"show":[49,148],"(1)":[50],"impact":[52],"widely-used":[54],"methods":[56,86],"timing":[58,68,89],"leakage,":[59],"(2)":[61],"that":[62,135,149],"well-known":[63],"countermeasures":[65],"reduce":[67],"leakage":[69,90,152],"programs,":[71],"are":[72],"not":[73],"always":[74],"effective":[75],"for":[76,87,111],"low-noise":[77],"environments":[78],"found":[79],"in":[80,91],"systems.":[82],"We":[83],"propose":[84],"two":[85],"mitigating":[88],"codes.":[93],"The":[94],"first":[95],"a":[97],"compiler":[98],"driven":[99],"method,":[100],"called":[101],"TAD,":[102],"which":[103],"removes":[104],"conditional":[105],"branches":[106],"with":[107,123,131],"distinguishable":[108],"second":[117],"method":[118],"(TADCI),":[119],"TAD":[120],"combined":[122],"dynamic":[124],"hardware":[125],"diversity":[126],"replacing":[128],"primitive":[129],"instructions":[130],"Custom":[132],"Instructions":[133],"(CIs)":[134],"exhibit":[136],"non-deterministic":[137],"at":[140],"runtime.":[141],"Experimental":[142],"results":[143],"RISC-V":[146],"platform":[147],"reduced":[154],"92%":[156],"82%":[158],"when":[159],"TADCI":[160],"applied":[162],"original":[165],"source":[168],"code,":[169],"respectively.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2019-01-25T00:00:00"}
