{"id":"https://openalex.org/W4280604968","doi":"https://doi.org/10.23919/date54114.2022.9774612","title":"A Cross-Platform Cache Timing Attack Framework via Deep Learning","display_name":"A Cross-Platform Cache Timing Attack Framework via Deep Learning","publication_year":2022,"publication_date":"2022-03-14","ids":{"openalex":"https://openalex.org/W4280604968","doi":"https://doi.org/10.23919/date54114.2022.9774612"},"language":"en","primary_location":{"id":"doi:10.23919/date54114.2022.9774612","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date54114.2022.9774612","pdf_url":null,"source":{"id":"https://openalex.org/S4363607924","display_name":"2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087838829","display_name":"Ruyi Ding","orcid":"https://orcid.org/0000-0002-0151-2548"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ruyi Ding","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100600501","display_name":"Ziyue Zhang","orcid":"https://orcid.org/0000-0002-6050-779X"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziyue Zhang","raw_affiliation_strings":["Northeastern University,Department of Mathematics,Boston,MA,USA","Department of Mathematics, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,Department of Mathematics,Boston,MA,USA","institution_ids":["https://openalex.org/I12912129"]},{"raw_affiliation_string":"Department of Mathematics, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368865","display_name":"Xiang Zhang","orcid":"https://orcid.org/0000-0002-5201-3802"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiang Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045682482","display_name":"Cheng Gongye","orcid":"https://orcid.org/0000-0002-6423-0871"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng Gongye","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083131515","display_name":"Yunsi Fei","orcid":"https://orcid.org/0000-0002-9930-0868"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yunsi Fei","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071052954","display_name":"A. Adam Ding","orcid":"https://orcid.org/0000-0003-1397-2442"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aidong A. Ding","raw_affiliation_strings":["Northeastern University,Department of Mathematics,Boston,MA,USA","Department of Mathematics, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,Department of Mathematics,Boston,MA,USA","institution_ids":["https://openalex.org/I12912129"]},{"raw_affiliation_string":"Department of Mathematics, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087838829"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4162,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.557453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"676","last_page":"681"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.812087893486023},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6851017475128174},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3339175879955292},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.24473655223846436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.812087893486023},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6851017475128174},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3339175879955292},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.24473655223846436}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date54114.2022.9774612","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date54114.2022.9774612","pdf_url":null,"source":{"id":"https://openalex.org/S4363607924","display_name":"2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2367472560","display_name":null,"funder_award_id":"SaTC-1929300,IUCRC-1916762","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W2028501442","https://openalex.org/W2056778557","https://openalex.org/W2106728965","https://openalex.org/W2144354855","https://openalex.org/W2337480911","https://openalex.org/W2469208367","https://openalex.org/W2889508486","https://openalex.org/W2902247216","https://openalex.org/W2911842201","https://openalex.org/W2912237282","https://openalex.org/W2945476062","https://openalex.org/W2990306706","https://openalex.org/W2996022685","https://openalex.org/W3030132388","https://openalex.org/W3037413756","https://openalex.org/W4251361495","https://openalex.org/W6629297748","https://openalex.org/W6675887568","https://openalex.org/W6720296912","https://openalex.org/W6754306559","https://openalex.org/W6758930985","https://openalex.org/W6769987458","https://openalex.org/W6771898502","https://openalex.org/W6780543027"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"While":[0],"deep":[1,85,109],"learning":[2,86],"methods":[3],"have":[4,12],"been":[5,14],"adopted":[6],"in":[7,55,132],"power":[8],"side-channel":[9,65],"analysis,":[10],"they":[11],"not":[13],"applied":[15],"to":[16,21,45,89,122,125,173,180,200],"cache":[17,26,34,38,63,92,105,151],"timing":[18,27,57,64,77,93,106],"attacks":[19,208],"due":[20],"the":[22,74,91,138,170,177,185],"limited":[23],"dimension":[24],"of":[25],"data.":[28],"This":[29],"paper":[30],"proposes":[31],"a":[32,46,61,82,101,115],"persistent":[33],"monitor":[35],"based":[36],"on":[37],"line":[39],"flushing":[40],"instructions,":[41],"which":[42],"runs":[43],"concurrently":[44],"victim":[47,129,146,201],"execution":[48],"and":[49,69,147,161,176,183,203],"captures":[50],"detailed":[51],"memory":[52],"access":[53],"patterns":[54],"high-dimensional":[56],"traces.":[58],"We":[59,79,98,136,153,164],"discover":[60],"new":[62,195],"across":[66],"both":[67],"inclusive":[68],"non-inclusive":[70],"caches,":[71],"different":[72,133,156],"from":[73,113,158],"traditional":[75],"\u201cFlush+Flush\u201d":[76],"leakage.":[78],"then":[80],"propose":[81,100],"non-profiling":[83],"differential":[84],"analysis":[87],"strategy":[88],"exploit":[90],"traces":[94],"for":[95,103,168],"key":[96],"recovery.":[97],"further":[99],"framework":[102],"cross-platform":[104,186],"attack":[107,126,188,196],"via":[108],"learning.":[110],"Knowledge":[111],"learned":[112],"profiling":[114],"common":[116],"reference":[117],"device":[118,175],"can":[119],"be":[120],"transferred":[121],"build":[123],"models":[124],"many":[127],"other":[128,181],"devices,":[130,182],"even":[131],"processor":[134],"families.":[135],"take":[137],"OpenSSL":[139],"AES-128":[140],"encryption":[141],"algorithm":[142],"as":[143],"an":[144,149],"example":[145],"deploy":[148],"asynchronous":[150],"attack.":[152],"target":[154],"three":[155],"devices":[157,202],"Intel,":[159],"AMD,":[160],"ARM":[162],"processors.":[163],"examine":[165],"various":[166],"scenarios":[167],"assigning":[169],"teacher":[171],"role":[172,179],"one":[174],"student":[178],"evaluate":[184],"deep-learning":[187],"framework.":[189],"Experimental":[190],"results":[191],"show":[192],"that":[193],"this":[194],"is":[197,204],"easily":[198],"extendable":[199],"more":[205],"effective":[206],"than":[207],"without":[209],"any":[210],"prior":[211],"knowledge.":[212]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
