{"id":"https://openalex.org/W4408112852","doi":"https://doi.org/10.3390/cryptography9010015","title":"The Impact of Clock Frequencies on Remote Power Side-Channel Analysis Attack Resistance of Processors in Multi-Tenant FPGAs","display_name":"The Impact of Clock Frequencies on Remote Power Side-Channel Analysis Attack Resistance of Processors in Multi-Tenant FPGAs","publication_year":2025,"publication_date":"2025-03-03","ids":{"openalex":"https://openalex.org/W4408112852","doi":"https://doi.org/10.3390/cryptography9010015"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9010015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010015","pdf_url":"https://www.mdpi.com/2410-387X/9/1/15/pdf?version=1741004817","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/1/15/pdf?version=1741004817","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113080164","display_name":"Qinming Zhou","orcid":"https://orcid.org/0009-0009-4666-7779"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinming Zhou","raw_affiliation_strings":["School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101338702","display_name":"Haozhi Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haozhi Xie","raw_affiliation_strings":["School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001383559","display_name":"Tao Su","orcid":"https://orcid.org/0000-0001-5227-1337"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Su","raw_affiliation_strings":["School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology (School of Microelectronics), Sun Yat-sen University, Guangzhou 510006, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001383559"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.8076,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89574366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"9","issue":"1","first_page":"15","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8710372447967529},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.8269607424736023},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.524985671043396},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5198767185211182},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46383628249168396},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4079234004020691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23728567361831665},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19708514213562012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.12099593877792358}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8710372447967529},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.8269607424736023},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.524985671043396},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5198767185211182},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46383628249168396},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4079234004020691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23728567361831665},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19708514213562012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.12099593877792358}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9010015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010015","pdf_url":"https://www.mdpi.com/2410-387X/9/1/15/pdf?version=1741004817","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b26983df0be14d18a9fe6e3de77fd69b","is_oa":true,"landing_page_url":"https://doaj.org/article/b26983df0be14d18a9fe6e3de77fd69b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 1, p 15 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9010015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010015","pdf_url":"https://www.mdpi.com/2410-387X/9/1/15/pdf?version=1741004817","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408112852.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W336323785","https://openalex.org/W1543721789","https://openalex.org/W1562542037","https://openalex.org/W1643721902","https://openalex.org/W2126904896","https://openalex.org/W2146675862","https://openalex.org/W2167501436","https://openalex.org/W2761003783","https://openalex.org/W2794898833","https://openalex.org/W2798781612","https://openalex.org/W2807669647","https://openalex.org/W2887256018","https://openalex.org/W2892344663","https://openalex.org/W2899083777","https://openalex.org/W2973780393","https://openalex.org/W2996863257","https://openalex.org/W2997725831","https://openalex.org/W3006293286","https://openalex.org/W3008474499","https://openalex.org/W3014400029","https://openalex.org/W3093685770","https://openalex.org/W3093818042","https://openalex.org/W3097478758","https://openalex.org/W3109014748","https://openalex.org/W3111614974","https://openalex.org/W3166251174","https://openalex.org/W4242164861","https://openalex.org/W4282968709","https://openalex.org/W4285326106","https://openalex.org/W4290648676","https://openalex.org/W4293261604","https://openalex.org/W4321512689","https://openalex.org/W4400187658","https://openalex.org/W6841201531","https://openalex.org/W6868391313"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W4244949874","https://openalex.org/W2425598453"],"abstract_inverted_index":{"Field-programmable":[0],"gate":[1],"arrays":[2],"(FPGAs)":[3],"are":[4,19,29],"widely":[5],"used":[6],"in":[7,75,149],"cloud":[8],"servers":[9],"as":[10],"an":[11],"acceleration":[12],"solution":[13],"for":[14],"compute-intensive":[15],"tasks.":[16],"Cloud":[17],"FPGAs":[18,57,151],"typically":[20],"multi-tenant,":[21],"enabling":[22],"resource":[23],"sharing":[24],"among":[25],"multiple":[26],"users":[27],"but":[28,61],"vulnerable":[30],"to":[31,38,101,159],"power":[32,59,67,161],"side-channel":[33,162],"analysis":[34,68],"(SCA)":[35],"attacks":[36,70,92,112],"due":[37],"their":[39,62],"programmability":[40],"and":[41,105,117,152],"runtime":[42,126],"dynamic":[43],"reconfigurability.":[44],"It":[45],"is":[46],"well-known":[47],"that":[48,124],"the":[49,53,76,87,110,125,131,143],"clock":[50,83,127,157],"frequencies":[51,158],"of":[52,89,133,146],"circuits":[54],"on":[55,64,93,113,155],"multi-tenant":[56,94,150],"affect":[58],"consumption,":[60],"impact":[63,104],"remote":[65,90,134],"correlation":[66],"(CPA)":[69],"has":[71],"largely":[72],"been":[73],"ignored":[74],"literature.":[77],"This":[78],"work":[79,138],"systematically":[80],"evaluates":[81],"how":[82],"frequency":[84,128,147],"variations":[85],"influence":[86],"effectiveness":[88],"CPA":[91,111,135],"FPGAs.":[95],"We":[96],"develop":[97],"a":[98],"theoretical":[99],"model":[100],"quantify":[102],"this":[103],"validate":[106],"our":[107],"findings":[108],"through":[109],"processors":[114],"running":[115],"AES-128":[116],"SM4":[118],"cryptographic":[119],"algorithms.":[120],"Our":[121,137],"results":[122],"demonstrate":[123],"significantly":[129],"affects":[130],"performance":[132],"attacks.":[136],"provides":[139],"valuable":[140],"insights":[141],"into":[142],"security":[144],"implications":[145],"scaling":[148],"offers":[153],"guidance":[154],"selecting":[156],"mitigate":[160],"risks.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
