{"id":"https://openalex.org/W2068712639","doi":"https://doi.org/10.1109/dtis.2013.6527798","title":"Privilege escalation attack through address space identifier corruption in untrusted modern processors","display_name":"Privilege escalation attack through address space identifier corruption in untrusted modern processors","publication_year":2013,"publication_date":"2013-03-01","ids":{"openalex":"https://openalex.org/W2068712639","doi":"https://doi.org/10.1109/dtis.2013.6527798","mag":"2068712639"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dtis.2013.6527798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Maniatakos","raw_affiliation_strings":["Electrical and Computer Engineering Department, New York University Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, New York University Abu Dhabi, UAE","institution_ids":["https://openalex.org/I57206974"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5043325974"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.201693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":65,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.983,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microprocessor","display_name":"Microprocessor","score":0.5321386},{"id":"https://openalex.org/keywords/user-space","display_name":"User space","score":0.42076764}],"concepts":[{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.70495296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6819196},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.64259064},{"id":"https://openalex.org/C2780728072","wikidata":"https://www.wikidata.org/wiki/Q5297","display_name":"Microprocessor","level":2,"score":0.5321386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.51625896},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4918971},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44869378},{"id":"https://openalex.org/C2775877400","wikidata":"https://www.wikidata.org/wiki/Q1142183","display_name":"User space","level":2,"score":0.42076764},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31833923}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dtis.2013.6527798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.82,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1541663547","https://openalex.org/W1567646530","https://openalex.org/W1593596224","https://openalex.org/W1993694077","https://openalex.org/W2012032225","https://openalex.org/W2014066342","https://openalex.org/W2055907668","https://openalex.org/W2056140283","https://openalex.org/W2067276029","https://openalex.org/W2145937629","https://openalex.org/W2147657366","https://openalex.org/W2153497135","https://openalex.org/W2493869930","https://openalex.org/W3044736293","https://openalex.org/W6385438"],"related_works":["https://openalex.org/W4206262792","https://openalex.org/W35849896","https://openalex.org/W2936348207","https://openalex.org/W2913213811","https://openalex.org/W2590612303","https://openalex.org/W2547460246","https://openalex.org/W2388410831","https://openalex.org/W2364654559","https://openalex.org/W2065942422","https://openalex.org/W2055279959"],"abstract_inverted_index":{"Privilege":[0],"escalation":[1],"attacks":[2,13],"are":[3],"one":[4],"of":[5,21,83,87,101,104,148],"the":[6,18,22,48,60,72,99,125,138,146],"major":[7],"threats":[8],"jeopardizing":[9],"microprocessor":[10,61],"operation.":[11],"Such":[12],"aim":[14],"to":[15,27,46,66,131],"maliciously":[16],"increase":[17],"privilege":[19,41,49],"level":[20],"executed":[23],"process,":[24,79],"in":[25,59,70],"order":[26],"access":[28],"unauthorized":[29],"resources.":[30],"Modern":[31],"microprocessors":[32],"include":[33],"complex":[34],"memory":[35],"management":[36],"modules,":[37],"with":[38,151],"various":[39],"different":[40],"levels":[42],"and":[43,134],"numerous":[44],"ways":[45],"change":[47],"level.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54,135],"present":[55],"a":[56,84,88,111,119],"malicious":[57,126],"modification":[58,73],"process":[62],"switch":[63],"mechanism.":[64],"Contrary":[65],"recent":[67],"work":[68],"presented":[69],"literature,":[71],"can":[74,114,141],"be":[75],"deployed":[76],"during":[77],"manufacturing":[78],"as":[80],"it":[81],"consists":[82],"trivial":[85],"addition":[86],"gate":[89],"or":[90],"wire":[91],"sizing.":[92],"The":[93],"minimal":[94,152],"footprint,":[95],"however,":[96],"comes":[97],"at":[98],"cost":[100],"small":[102],"window":[103],"attack":[105],"opportunities.":[106],"Experimental":[107],"results":[108],"show":[109,136],"that":[110,137],"modification-aware":[112],"application":[113],"gain":[115],"escalated":[116,143],"privileges":[117,144],"within":[118],"few":[120],"thousand":[121],"clock":[122],"cycles.":[123],"Moreover,":[124],"code":[127],"has":[128],"been":[129],"added":[130],"SPEC":[132],"benchmarks,":[133],"modified":[139],"benchmarks":[140],"get":[142],"before":[145],"end":[147],"typical":[149],"workload,":[150],"performance":[153],"overhead.":[154]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2068712639","counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-08T19:14:46.907096","created_date":"2016-06-24"}