{"id":"https://openalex.org/W4400836516","doi":"https://doi.org/10.46586/tches.v2024.i3.342-376","title":"PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software","display_name":"PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software","publication_year":2024,"publication_date":"2024-07-18","ids":{"openalex":"https://openalex.org/W4400836516","doi":"https://doi.org/10.46586/tches.v2024.i3.342-376"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2024.i3.342-376","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.342-376","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.46586/tches.v2024.i3.342-376","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092128643","display_name":"Jannik Zeitschner","orcid":"https://orcid.org/0000-0003-3682-1567"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jannik Zeitschner","raw_affiliation_strings":["Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012815811","display_name":"Amir Moradi","orcid":"https://orcid.org/0000-0002-4032-7433"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Amir Moradi","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092128643"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.0326,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75218613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"2024","issue":"3","first_page":"342","last_page":"376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9416000247001648,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5326430797576904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5277099013328552},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4703037142753601},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3311387598514557}],"concepts":[{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5326430797576904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5277099013328552},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4703037142753601},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3311387598514557}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2024.i3.342-376","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.342-376","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:093fe7d2b36141aab775020092bcf6f6","is_oa":true,"landing_page_url":"https://doaj.org/article/093fe7d2b36141aab775020092bcf6f6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2024.i3.342-376","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.342-376","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.44999998807907104,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W130371449","https://openalex.org/W150190951","https://openalex.org/W587262091","https://openalex.org/W1592625985","https://openalex.org/W1598102953","https://openalex.org/W1607006990","https://openalex.org/W1847989447","https://openalex.org/W1873852107","https://openalex.org/W1897761346","https://openalex.org/W2023035194","https://openalex.org/W2114286085","https://openalex.org/W2117290716","https://openalex.org/W2124153277","https://openalex.org/W2140191557","https://openalex.org/W2161740631","https://openalex.org/W2536698892","https://openalex.org/W2570230384","https://openalex.org/W2621165181","https://openalex.org/W2751043011","https://openalex.org/W2950621244","https://openalex.org/W2972962130","https://openalex.org/W2987396438","https://openalex.org/W3003996345","https://openalex.org/W3004433901","https://openalex.org/W3028770573","https://openalex.org/W3032645156","https://openalex.org/W3037092799","https://openalex.org/W3037313463","https://openalex.org/W3046514168","https://openalex.org/W3085353452","https://openalex.org/W3096767560","https://openalex.org/W3133865019","https://openalex.org/W3159164431","https://openalex.org/W3173700271","https://openalex.org/W3184749315","https://openalex.org/W3186788923","https://openalex.org/W3198521247","https://openalex.org/W3203555882","https://openalex.org/W3216992816","https://openalex.org/W4220799736","https://openalex.org/W4252865489","https://openalex.org/W4288057788","https://openalex.org/W4299489258","https://openalex.org/W4308391452","https://openalex.org/W4379056537"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Software":[0],"solutions":[1],"to":[2,33,80,97,144,167,223,233],"address":[3],"computational":[4],"challenges":[5],"are":[6,31],"ubiquitous":[7],"in":[8,22,116,150,164,273],"our":[9,181],"daily":[10],"lives.":[11],"One":[12],"specific":[13],"application":[14],"area":[15],"where":[16],"software":[17,142,190,236],"is":[18,21,39,129,203,211,270],"often":[19,123],"used":[20,79],"embedded":[23],"systems,":[24],"which,":[25],"like":[26],"other":[27],"digital":[28],"electronic":[29],"devices,":[30],"vulnerable":[32],"side-channel":[34],"analysis":[35],"attacks.":[36],"Although":[37],"masking":[38,83],"the":[40,69,73,87,92,105,117,160,168,171,184,214,218,240,243,251],"most":[41],"common":[42],"countermeasure":[43],"and":[44,62,126,128],"provides":[45],"a":[46,57,98,151,175,265],"solid":[47],"theoretical":[48,61],"foundation":[49],"for":[50,132,178,195],"ensuring":[51],"security,":[52],"recent":[53],"research":[54],"has":[55],"revealed":[56],"crucial":[58,215],"gap":[59],"between":[60],"real-world":[63],"security.":[64],"This":[65],"shortcoming":[66],"stems":[67],"from":[68],"micro-architectural":[70,93,121],"effects":[71],"of":[72,100,109,119,170,186,201,213,242,253,259],"underlying":[74],"micro-processor.":[75],"Common":[76],"security":[77,163,193],"models":[78],"formally":[81],"verify":[82],"schemes":[84],"such":[85,120],"as":[86],"d-probing":[88],"model":[89,177],"fully":[90],"ignore":[91],"leakages":[94],"that":[95,102,113,226],"lead":[96],"set":[99],"instructions":[101],"unintentionally":[103],"recombine":[104],"shares.":[106],"Manual":[107],"generation":[108,185],"masked":[110,147,189,235],"assembly":[111,156],"code":[112],"remains":[114],"secure":[115,188],"presence":[118],"recombinations":[122],"involves":[124],"trial":[125],"error,":[127],"non-trivial":[130],"even":[131],"experts.Motivated":[133],"by":[134,229],"this,":[135],"we":[136,227,238],"present":[137,250],"PoMMES,":[138],"which":[139,210,269],"enables":[140],"inexperienced":[141],"developers":[143],"automatically":[145],"compile":[146],"functions":[148],"written":[149],"high-level":[152],"programming":[153],"language":[154],"into":[155],"code,":[157],"while":[158],"preserving":[159],"theoretically":[161],"proven":[162],"practice.":[165],"Compared":[166],"state":[169],"art,":[172],"based":[173,256],"on":[174,264],"general":[176],"microarchitectural":[179],"effects,":[180],"scheme":[182],"allows":[183],"practically":[187],"at":[191],"arbitrary":[192],"orders":[194],"in-order":[196],"processors.":[197],"The":[198],"major":[199],"contribution":[200],"PoMMES":[202],"its":[204],"micro-architecture":[205],"aware":[206],"register":[207],"allocation":[208],"algorithm,":[209],"one":[212],"steps":[216],"during":[217],"compilation":[219],"process.":[220],"In":[221],"addition":[222],"simulation-based":[224],"assessments":[225,258],"conducted":[228],"open-source":[230],"tools":[231],"dedicated":[232],"evaluating":[234],"implementations,":[237],"confirm":[239],"effectiveness":[241],"PoMMES-generated":[244],"codes":[245],"through":[246],"experimental":[247],"analysis.":[248],"We":[249],"result":[252],"power":[254],"consumption":[255],"leakage":[257],"several":[260],"case":[261],"studies":[262],"running":[263],"Cortex":[266],"M0+":[267],"micro-controller,":[268],"commonly":[271],"deployed":[272],"industry.":[274]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
