{"id":"https://openalex.org/W3098207126","doi":"https://doi.org/10.3233/jcs-191356","title":"Bucketing and information flow analysis for provable timing attack mitigation","display_name":"Bucketing and information flow analysis for provable timing attack mitigation","publication_year":2020,"publication_date":"2020-11-10","ids":{"openalex":"https://openalex.org/W3098207126","doi":"https://doi.org/10.3233/jcs-191356","mag":"3098207126"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-191356","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-191356","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031661604","display_name":"Tachio Terauchi","orcid":"https://orcid.org/0000-0001-5305-4916"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tachio Terauchi","raw_affiliation_strings":["Department of Computer Science and Engineering, Waseda University, Tokyo, Japan. E-mail:\u00a0","Department of Computer Science and Engineering, Waseda University, Tokyo, Japan. E-mail:\u00a0terauchi@waseda.jp"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Waseda University, Tokyo, Japan. E-mail:\u00a0","institution_ids":["https://openalex.org/I150744194"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Waseda University, Tokyo, Japan. E-mail:\u00a0terauchi@waseda.jp","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045656414","display_name":"Timos Antonopoulos","orcid":"https://orcid.org/0000-0002-9654-4090"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timos Antonopoulos","raw_affiliation_strings":["Department of Computer Science, Yale University, New Haven, CT, U.S.A.. E-mail:\u00a0","Department of Computer Science, Yale University, New Haven, CT, U.S.A.. E-mail:\u00a0timos.antonopoulos@yale.edu"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yale University, New Haven, CT, U.S.A.. E-mail:\u00a0","institution_ids":["https://openalex.org/I32971472"]},{"raw_affiliation_string":"Department of Computer Science, Yale University, New Haven, CT, U.S.A.. E-mail:\u00a0timos.antonopoulos@yale.edu","institution_ids":["https://openalex.org/I32971472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031661604"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14536918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"6","first_page":"607","last_page":"634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7915669083595276},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.7146023511886597},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.655683159828186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5816850662231445},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22356918454170227},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1292356550693512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7915669083595276},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.7146023511886597},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.655683159828186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5816850662231445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22356918454170227},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1292356550693512}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-191356","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-191356","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W150190951","https://openalex.org/W182286721","https://openalex.org/W200081508","https://openalex.org/W1484057600","https://openalex.org/W1506713622","https://openalex.org/W1511843316","https://openalex.org/W1511850051","https://openalex.org/W1589478560","https://openalex.org/W1592625985","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1819958245","https://openalex.org/W1929260587","https://openalex.org/W1977764760","https://openalex.org/W1987983106","https://openalex.org/W1997775274","https://openalex.org/W2008235019","https://openalex.org/W2037851672","https://openalex.org/W2078114603","https://openalex.org/W2097151854","https://openalex.org/W2103289002","https://openalex.org/W2104658241","https://openalex.org/W2108104925","https://openalex.org/W2116660249","https://openalex.org/W2116807588","https://openalex.org/W2117550587","https://openalex.org/W2119253309","https://openalex.org/W2132350687","https://openalex.org/W2139799388","https://openalex.org/W2149517094","https://openalex.org/W2149996206","https://openalex.org/W2150174204","https://openalex.org/W2154909745","https://openalex.org/W2171023083","https://openalex.org/W2293441536","https://openalex.org/W2418260908","https://openalex.org/W2460965380","https://openalex.org/W2515614845","https://openalex.org/W2538823313","https://openalex.org/W2602388145","https://openalex.org/W2626217303","https://openalex.org/W2886207505","https://openalex.org/W2888566704","https://openalex.org/W2933266718","https://openalex.org/W2960006911","https://openalex.org/W2963472894","https://openalex.org/W2971443702","https://openalex.org/W2995573473","https://openalex.org/W2997326335","https://openalex.org/W3103010406","https://openalex.org/W4236770701","https://openalex.org/W4238789074","https://openalex.org/W4250728693","https://openalex.org/W6604767952"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4323824501","https://openalex.org/W4200321003","https://openalex.org/W2355552010","https://openalex.org/W2390279801","https://openalex.org/W4236373173","https://openalex.org/W2358668433","https://openalex.org/W2136687465","https://openalex.org/W2376932109","https://openalex.org/W3196561854"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,35,39,108,124,129,133,151,161,164,183,188,191,198,208,227,244,250],"effect":[4,36],"of":[5,37,47,93,110,150,158,163,171,173,190,226,246,266],"bucketing":[6,61,73,137,199],"in":[7,75,205],"security":[8,92,109,162,189],"against":[9,64,95,144],"timing-channel":[10,19,41,65,97,121,145],"attacks.":[11,66,98,146],"Bucketing":[12],"is":[13,51,62,74,101,138,153,253],"a":[14,23,44,102,111,116],"technique":[15,200,210],"proposed":[16],"to":[17,26,43,58,78,90,186,211,220,236,255],"mitigate":[18],"attacks":[20],"by":[21,115,119],"restricting":[22],"system\u2019s":[24],"outputs":[25],"only":[27,114],"occur":[28],"at":[29],"designated":[30],"time":[31],"intervals,":[32],"and":[33,57,140,177,223,233,240,276],"has":[34],"reducing":[38],"possible":[40,247],"observations":[42,248],"small":[45],"number":[46,245],"possibilities.":[48],"However,":[49],"there":[50],"little":[52],"formal":[53],"analysis":[54],"on":[55,182,249],"when":[56,136],"what":[59],"degree":[60,118],"effective":[63],"In":[67],"this":[68],"paper,":[69],"we":[70,82,195,216],"show":[71,196],"that":[72,86,105,107,128,154,197,242,257],"general":[76,103,232],"insufficient":[77],"ensure":[79,91],"security.":[80],"Then,":[81],"present":[83],"two":[84],"conditions":[85,152,179],"can":[87,167,201],"be":[88,168,202],"used":[89],"systems":[94],"adaptive":[96],"The":[99],"first":[100,134],"condition":[104,126,135],"ensures":[106,127],"system":[112,130],"decreases":[113],"limited":[117],"allowing":[120],"observations,":[122],"whereas":[123],"second":[125],"would":[131],"satisfy":[132],"applied":[139,203],"hence":[141],"becomes":[142],"secure":[143],"A":[147],"main":[148],"benefit":[149],"they":[155],"allow":[156],"separation":[157],"concerns":[159,172],"whereby":[160],"regular":[165],"channel":[166,185,222,274],"proven":[169],"independently":[170],"side-channel":[174],"information":[175,269],"leakage,":[176],"certain":[178],"are":[180,229,234],"placed":[181],"side":[184,238],"guarantee":[187],"whole":[192],"system.":[193],"Further,":[194],"compositionally":[204],"conjunction":[206],"with":[207],"constant-time-implementation":[209],"increase":[212],"their":[213],"applicability.":[214],"While":[215],"instantiate":[217],"our":[218,258],"contributions":[219],"timing":[221],"bucketing,":[224],"many":[225],"results":[228,259],"actually":[230],"quite":[231],"applicable":[235],"any":[237],"channels":[239],"techniques":[241],"reduce":[243],"channel.":[251],"It":[252],"interesting":[254],"note":[256],"make":[260],"non-trivial":[261],"(and":[262],"somewhat":[263],"unconventional)":[264],"uses":[265],"ideas":[267],"from":[268],"flow":[270],"research":[271],"such":[272],"as":[273],"capacity":[275],"refinement":[277],"order":[278],"relation.":[279]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2025-10-10T00:00:00"}
