{"id":"https://openalex.org/W2324303576","doi":"https://doi.org/10.4108/eai.14-12-2015.2262698","title":"Protecting Encryption Keys in Mobile Systems Against Memory Errors","display_name":"Protecting Encryption Keys in Mobile Systems Against Memory Errors","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2324303576","doi":"https://doi.org/10.4108/eai.14-12-2015.2262698","mag":"2324303576"},"language":"en","primary_location":{"id":"doi:10.4108/eai.14-12-2015.2262698","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eai.14-12-2015.2262698","pdf_url":"http://eudl.eu/pdf/10.4108/eai.14-12-2015.2262698","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://eudl.eu/pdf/10.4108/eai.14-12-2015.2262698","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107748060","display_name":"Jianing Zhao","orcid":"https://orcid.org/0000-0002-1579-0522"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jianing Zhao","raw_affiliation_strings":["The College of William and Mary"],"affiliations":[{"raw_affiliation_string":"The College of William and Mary","institution_ids":["https://openalex.org/I16285277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108592838","display_name":"Peter Kemper","orcid":null},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Kemper","raw_affiliation_strings":["The College of William and Mary"],"affiliations":[{"raw_affiliation_string":"The College of William and Mary","institution_ids":["https://openalex.org/I16285277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107748060"],"corresponding_institution_ids":["https://openalex.org/I16285277"],"apc_list":null,"apc_paid":null,"fwci":0.23811105,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5239622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7662359476089478},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.765122652053833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6373693943023682},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5777292251586914},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5361798405647278},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4748288094997406},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.44972893595695496},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4434424936771393},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41818147897720337},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.30786317586898804},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2643589377403259},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10241925716400146},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10026445984840393}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7662359476089478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.765122652053833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6373693943023682},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5777292251586914},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5361798405647278},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4748288094997406},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.44972893595695496},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4434424936771393},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41818147897720337},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.30786317586898804},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2643589377403259},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10241925716400146},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10026445984840393}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4108/eai.14-12-2015.2262698","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eai.14-12-2015.2262698","pdf_url":"http://eudl.eu/pdf/10.4108/eai.14-12-2015.2262698","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:2aa16f74ed274a1e882184b24473b331","is_oa":true,"landing_page_url":"https://doaj.org/article/2aa16f74ed274a1e882184b24473b331","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EAI Endorsed Transactions on Security and Safety, Vol 3, Iss 10, Pp 1-4 (2016)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.4108/eai.14-12-2015.2262698","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eai.14-12-2015.2262698","pdf_url":"http://eudl.eu/pdf/10.4108/eai.14-12-2015.2262698","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2324303576.pdf","grobid_xml":"https://content.openalex.org/works/W2324303576.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W169290973","https://openalex.org/W171996078","https://openalex.org/W1963971515","https://openalex.org/W1970426108","https://openalex.org/W1983178358","https://openalex.org/W2083570493","https://openalex.org/W2120591095","https://openalex.org/W2122249806","https://openalex.org/W2170334586","https://openalex.org/W2535399211","https://openalex.org/W2743332873","https://openalex.org/W4245276998"],"related_works":["https://openalex.org/W2372014581","https://openalex.org/W2091359829","https://openalex.org/W2379631527","https://openalex.org/W2490080356","https://openalex.org/W4300978562","https://openalex.org/W1484220609","https://openalex.org/W2094124631","https://openalex.org/W222001389","https://openalex.org/W2350287915","https://openalex.org/W3214026606"],"abstract_inverted_index":{"Beyond":[0],"its":[1],"use":[2],"to":[3,15,18,88,107],"encrypt":[4],"data,":[5],"an":[6,63,108],"encryption":[7],"key":[8,33,52,104],"can":[9,105],"be":[10],"used":[11],"as":[12],"a":[13,21,26,32,37,98,103,113],"mean":[14],"control":[16],"access":[17],"data":[19,110],"on":[20,44,69],"mobile":[22,38,114],"de-vice":[23],"by":[24,48],"leveraging":[25],"cloud":[27],"service.":[28],"This":[29],"implies":[30],"that":[31,66,101],"is":[34,43,53,57,62,67],"present":[35],"in":[36,59,79,112],"device":[39],"only":[40,78],"when":[41,55],"it":[42,56],"demand":[45],"and":[46],"authorized":[47],"the":[49,51],"cloud,":[50],"evicted":[54],"not":[58],"use.":[60],"CleanOS":[61],"example":[64],"system":[65],"based":[68],"this":[70,92],"concept.":[71],"For":[72],"security":[73],"reasons,":[74],"keys":[75],"are":[76],"stored":[77],"DRAM":[80],"memory":[81,89,99],"during":[82],"execution,":[83],"which":[84],"makes":[85],"them":[86],"susceptible":[87],"errors.":[90],"In":[91],"paper,":[93],"we":[94],"identify":[95],"scenarios":[96],"where":[97],"error":[100],"damages":[102],"escalate":[106],"unrecoverable":[109],"loss":[111],"system.":[115]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
